Securing a World Dominated by Software

By Achim D. Brucker.

We are currently experiencing one more time a software revolution: already in the 1970ies, software-based systems started to replace manual business processes. Today, we are seeing more and more mechanical controls being replaced by software, and we are at the verge of software also starting to make complex decisions that affect all aspects of our daily life.

Hence, the safety and security of software systems is more important than ever. In this talk, I will give an overview of different research in the area of software security for a connected world. In particular, I aim for showing the two opposite ends of the spectrum: an applied approach to security the software supply chain and an approach for analysing security protocols based on formal verification.

Please cite this work as follows:
A. D. Brucker, “Securing a world dominated by software,” presented at the Security group seminar of the University of Kent, Kent, UK, Jan. 31, 2020.

BibTeX
@Unpublished{ talk:brucker:software-security:2020,
  author     = {Achim D. Brucker},
  date       = {2020-01-31},
  title      = {Securing a World Dominated by Software},
  abstract   = {We are currently experiencing one more time a software
                revolution: already in the 1970ies, software-based systems
                started to replace manual business processes. Today, we are
                seeing more and more mechanical controls being replaced by
                software, and we are at the verge of software also starting to
                make complex decisions that affect all aspects of our daily
                life.
                
                Hence, the safety and security of software systems is more
                important than ever. In this talk, I will give an overview of
                different research in the area of software security for a
                connected world. In particular, I aim for showing the two
                opposite ends of the spectrum: an applied approach to security
                the software supply chain and an approach for analysing
                security protocols based on formal verification.},
  eventtitle = {Security Group Seminar of the {University of Kent}},
  venue      = {Kent, UK},
  areas      = {security},
}