InfoQ Homepage Security Content on InfoQ
-
Building Secure Player Experiences at Riot Games
David Rook talks about the Riot Games Application Security program. He focusses on the tech and social aspects of the program and why he feels both are important when it comes to writing secure code.
-
How to Backdoor Invulnerable Code
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.
-
Blockchain: The Oracle Problems
Paul Sztorc talks about why the oracle problem is so hard (the historical evolution of failures, why they fail), and the basics of blockchain ("blockchain as immortal software", ledger "rents").
-
Case Study: Alternate Blockchains
Jeremy Rand talks about Namecoin and Monero, the advantages to alternate blockchains, and risks of using chains that are not as secured or are merge mined.
-
Practical Blockchains: Building on Bitcoin
Peter Todd answers the questions: why use Bitcoin over other blockchains, what is safe, future proof ways to peg data to Bitcoin's blockchain and what is Bitcoin script, and how it can be used.
-
IoT, DDoS, and the DNS: Development Models for a Hostile Internet
Chris Baker overviews the IoT DDoS landscape, providing both a comprehensive mental model for IoT botnets, as well as sharing some insight into recent adaptations to network threat models.
-
Practical Cryptography & Blockchain Panel
The panel discusses the most important trends involving the blockchain today and fields questions from the audience. Topics covered: smart contracts, oracles, sidechains, and blockchains.
-
Building Reliability in an Unreliable World
Greg Murphy describes how GameSparks has designed their platform to be tolerant of many things: unreliable and slow internet connectivity, cloud resources that can fail without warning, and more.
-
Assuring Crypto-code with Automated Reasoning
A.Tomb describes the capabilities of some open source tools that allow us to automatically determine whether a low-level cryptographic implementation matches a higher-level mathematical specification
-
Security War Stories: The Battle for the Internet of Things
Alasdair Allan discusses the security problems when building Internet of Things devices, and the underlying differences between the IoT and the digital Internet that drive those security issues.
-
Selling Unikernels: The CyberChaff Experience
Adam Wick talks about his team’s experience developing CyberChaff, a novel network defense solution with unikernels built into its core and why unikernels made sense for them.
-
The Seven Righteous Fights
Heidi Waterhouse discusses seven issues to tackle during project development: Localization, Security, Extensibility, Documentation, Affordance, Acceptance, Accessibility.