Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Computer Security, The Next 50 Years 234

bariswheel writes "Alan Cox, fellow at Red Hat Linux, gives a short-and-sweet talk at the European OSCON on the The Next 50 Years of Computer Security. Implementations of modularity, Trusted Computing hardware, 'separation of secrets,' and overcoming the challenge of users not reading dialog boxes, will be crucial milestones as we head on to the future. He states: "As security improves, we need to keep building things which are usable, which are turned on by default, which means understanding users is the target for the next 50 years. You don't buy a car with optional bumpers. You can have a steering wheel fitted if you like, but it comes with a spike by default." All of this has to be shipped in a way that doesn't stop the user from doing things."
This discussion has been archived. No new comments can be posted.

Computer Security, The Next 50 Years

Comments Filter:
  • Haskell. (Score:2, Informative)

    by Anonymous Coward on Monday May 08, 2006 @02:30AM (#15283654)
    We will likely see software security improve once languages like Haskell and Erlang are more often used.

    There are, of course, some security issues that are independent of the language used. Some are inherent to protocols, for instance. However, buffer overflows and so forth are a thing of the past when using a language with proper memory management.

    Security glitches caused by basic concurrency errors are also avoided when using a language such as Haskell, that can automatically parallelize computations.

  • by Cybersonic ( 7113 ) <ralph@ralph.cx> on Monday May 08, 2006 @02:51AM (#15283701) Homepage
    you know he wrote the Red Hat FireStarter iptables GUI and various parts of the linux tcp/ip stack right?
  • Re:Haskell. (Score:5, Informative)

    by PsychicX ( 866028 ) on Monday May 08, 2006 @03:41AM (#15283806)
    More importantly, the security models currently used in the kernel are broken, and we can formally prove that they are inadequate. Academic research in this area has been extremely productive, but there are major barriers to entry in the commercial world for the obvious reasons.

    At the moment it looks like micrkernel architectures (real ones, none of this hybrid stuff) coupled with capability based security systems, should be able to provide real, formally verifiable security. As with most things there are a handful of practical barriers to overcome (primarily performance related), but another 5-10 years and those problems should be sorted out.

    For a more in-depth discussion of capability systems, see the wiki page [wikipedia.org], and this essay by Dr. Jonathan Shapiro [eros-os.org]. (And to be perfectly honest, he's a professor of mine and my views are colored as such.)
  • Re:Are you joking? (Score:2, Informative)

    by Jedi Alec ( 258881 ) on Monday May 08, 2006 @05:50AM (#15284006)
    ..except the one which has become our eventuality - a world who put every ounce of faith in its almighty petroleum god and woke up one morning to find it expended with a vital infrastructure which couldn't exist without it. Now THAT'S a plot!

    Now, funnily enough I just saw a report on tv last night that will be presented to my government today concerning the steps we need to take in order to become self-sufficient in terms of energy within a 50 year timespan. Solar, wind, planetary heat, biogas, you name it, we're doing it. The way I see it, those countries that find the right solutions for durable energy are going to have a very prosperous future indeed, and the way things are looking right now, those countries will located in Western Europe. Sweden already has cars driving around on 85% ethanol. Germany has so many wind turbines that when there's too much wind the power grid gets more than it can handle. Cow shit is being used to generate electricity, with the remainder being chemically converted into fertilizer.

    All the tech's right there for the taking. All it takes is a government with enough balls and a sufficient amount of long term vision to go for it.
  • by Sheriff of Rockridge ( 843569 ) on Monday May 08, 2006 @05:54AM (#15284015)
    It was a joke...
  • by cquark ( 246669 ) on Monday May 08, 2006 @01:27PM (#15286499)
    Usability is a growing area of research within computer security. The SOUPS [cmu.edu] conference focuses on that subject. The SOUPS Blog [usablesecurity.com] discusses user interface changes that would help computer users realize that bad guys are attempting to trick them, like using per-user labels or backgrounds so that phishers can't emulate a site since it differs for each users in ways the phisher can't predict.

    If you design user interfaces to secure applications, I highly recommend the O'Reilly book Security and Usability. It's a collection of classic and new papers on the topic. Simson Garfinkel's thesis [simson.net] is also a good reference on usability and security.

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...