![]() ![]() In this talk, the speaker will draw from his deep well of experience making serious mistakes in this area to lay out some of the basic challenges facing industry and academia while humbly suggesting some possible ways forward. Unlike before, however, this is not just a computer science problem but one that crosses into the worlds of sociology, psychology, political science, and anthropology. The tech industry is now facing a whole set of new issues, ones involving our inability to build products that are safe, trustworthy, and respectful of user privacy when deployed to billions globally. ![]() Twenty years have past and, while things are far from perfect, we at least have a great deal more understanding of how to address core information security risks in complex software projects. Every year brought the invention of completely new classes of software flaw, there was little training available in industry or the academy, and security was considered something you added with a firewall and antivirus. ( Sign in to your USENIX account to download these files.)Īround the turn of the century, the technology industry faced a pretty basic problem: we had no idea how to write secure software. USENIX Security '19 Proceedings Interior (PDF, 209.7 MB, best for mobile devices) USENIX Security '19 Full Proceedings (PDF, 210.5 MB) Copyright to the individual works is retained by the author. ![]() Individual papers can also be downloaded from the presentation page. The full Proceedings published by USENIX for the conference are available for download below. See the Program at a Glance for a quick overview of what's happening at USENIX Security '19. View the program in mobile-friendly grid format. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |