Write a Blog >>
SPLASH 2017
Sun 22 - Fri 27 October 2017 Vancouver, Canada
Wed 25 Oct 2017 14:00 - 14:30 at Regency D - Security Chair(s): Karim Ali

Language designers and developers want better ways to write good code– languages designed with simpler, more powerful abstractions accessible to a larger community of developers. However, language design does not seem to take into account security, leaving developers with the onerous task of writing attack-proof code. In 20 years, we have gone from 25 reported vulnerabilities to 6,000+ vulnerabilities reported in a year. The top two types of vulnerabilities for the past few years have been known for over 15+ years. I’ll summarise data on vulnerabilities during 2013-2015 and argue that our languages must take security seriously. Languages need security-oriented constructs, and compilers must let developers know when there is a problem with their code. We need to empower developers with the concept of “security for the masses” by making available languages that do not necessarily require an expert in order to determine whether the code being written is vulnerable to attack or not.

Wed 25 Oct

splash-2017-SPLASH-I
13:30 - 15:00: SPLASH-I - Security at Regency D
Chair(s): Karim AliUniversity of Alberta
splash-2017-SPLASH-I150893100000013:30 - 14:00
Talk
Ben LivshitsImperial College London, UK
splash-2017-SPLASH-I150893280000014:00 - 14:30
Talk
splash-2017-SPLASH-I150893460000014:30 - 15:00
Talk
Jean YangCarnegie Mellon University