DOC PREVIEW
UW CSEP 590 - Lecture Notes

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Getting Vulnerabilities Out of SoftwareIntroductionsOngoing ProcessConceptionDesignImplementationSupportGetting VulnerabilitiesOut of SoftwareMark PustilnikSecurity Development LeadSecure Windows Initiative Attack TeamMicrosoft(also a UW PMP alumnus)Introductions•Who am I and what do I do?•A few words about the Secure Windows Initiative team at Microsoft•http://www.eweek.com/article2/0,1895,1879502,00.asp•What is behind Microsoft’s turnaround in security?Ongoing Process•Conception – avoid the impossible•Design – catches bad bugs•Implementation – more prescriptive•Support – addresses things you miss and emerging threatsConception•Case study: DRM solutions•What do you expect DRM to do?•What are the challenges?•Messaging: promises vs. delivery•What can realistically be delivered?Design•It’s all about security guarantees•Case study: security guarantees of on-line backup softwareImplementation•Cookbook analysis (if design is solid)•Case study: Aren’t you glad you authenticated?Support•Organizational structure (people)•Platform support (technology)•Customer Expectations


View Full Document

UW CSEP 590 - Lecture Notes

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?