Futuristic Constructive Software Security Decathalon

Forums Personal Topics Unbidden Thoughts Futuristic Constructive Software Security Decathalon

This topic contains 2 replies, has 1 voice, and was last updated by  josh April 10, 2021 at 11:45 am.

  • Author
    Posts
  • #89155

    josh

    Some thinking paths:

    Can I make a list of all the types of operations that I want to examine & hook? Is there any complete system out there today that tries to guard all of the list items?

    In which classes of programs can I find all of the hooks in source code? How about binary code for good citizens?

    What sort of source code changes promote better segregation & identification of dynamically loaded, read only data?

  • #89245

    josh

    As platform variations become more common, they receive special attention from developers of new software & porters of old software. Fixing bugs becomes the normal thing. Many security focused designs give some range of choices between halting & warning for suspicious or violating processes. Suspicious often turns out to be what was intended for service. Success in the long run depends on the mix of design benefits, cost, convenience, & ease of development. As AI & Knowledge sharing agents advance, they will provide great benefits & enormous security risks. Preventing the agents from getting hacked & from unauthorized spying will both be important alongside keeping everything conveniently running in a nice way. My industry prediction is for larger numbers of sometimes buggy processes that compete for user attention & also spend more time running autonomously in the background. What combination of hardware & software platforms provide the best support?

You must be logged in to reply to this topic.