Better Foundations for Secure Software: Minimize Trust and Verify It

Thu 19Nov2020
Since June 2016 you need to have a valid API key enabled to display Google maps, see plugin settings

Shweta Shinde, ETH Zürich

From 12.30 until 13.30

At Zoom:


Software systems are ever-growing in size and complexity while being rife with vulnerabilities. Patches and defenses are continuously deployed, but the software attack surface is extremely large and attackers invariably find ways to gain a persistent foothold. An effective way to end the arms race between vulnerabilities and defense tools is by isolating the software using trusted hardware. With such isolation, what is the least amount of code that needs to be bug-free to securely run user applications? At the moment, even after using trusted hardware, this number can be upwards of a few million lines of code. Can we do any better?

In this talk, I present two key results from my work that shows a foundational approach to safeguard applications against large and potentially buggy software. I present a principled way of using hardware isolation to securely execute Linux applications while only trusting a few thousand lines of code. These implementations point to a new way of executing secure applications with a thousand lines of trusted and verified code. Finally, I will summarize my long-term vision for building the next generation of better, trusted, and verified secure hardware and software designs.

Join the Zoom meeting at 12:30 on Thursday, November 19th:

Download Event to Calendar