Write a Blog >>
SPLASH 2017
Sun 22 - Fri 27 October 2017 Vancouver, Canada
Wed 25 Oct 2017 14:00 - 14:30 at Regency D - Security Chair(s): Karim Ali

Language designers and developers want better ways to write good code– languages designed with simpler, more powerful abstractions accessible to a larger community of developers. However, language design does not seem to take into account security, leaving developers with the onerous task of writing attack-proof code. In 20 years, we have gone from 25 reported vulnerabilities to 6,000+ vulnerabilities reported in a year. The top two types of vulnerabilities for the past few years have been known for over 15+ years. I’ll summarise data on vulnerabilities during 2013-2015 and argue that our languages must take security seriously. Languages need security-oriented constructs, and compilers must let developers know when there is a problem with their code. We need to empower developers with the concept of “security for the masses” by making available languages that do not necessarily require an expert in order to determine whether the code being written is vulnerable to attack or not.

Wed 25 Oct

Displayed time zone: Tijuana, Baja California change

13:30 - 15:00
SecuritySPLASH-I at Regency D
Chair(s): Karim Ali University of Alberta
13:30
30m
Talk
Browser Performance Woes: Past, Present, and Future
SPLASH-I
Ben Livshits Imperial College London, UK
14:00
30m
Talk
It's Time for Secure Languages
SPLASH-I
Cristina Cifuentes Oracle Labs
14:30
30m
Talk
Preventing Information Leaks by Construction
SPLASH-I
Jean Yang Carnegie Mellon University