

Gernot Heiser: Defend Against Cyber Threats | Gaming the Future Chapter 8
Jul 29, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Introduction
00:00 • 3min
The Meager Adoption Path to SEL4
03:04 • 4min
The Role of Secure Computing in Moving Forward
07:15 • 3min
SEL4: A Secure Operating System
10:20 • 3min
The Importance of Least Authority in SEL4
13:48 • 5min
The Benefits of SEO4
19:14 • 5min
The Limitations of ACL-4
24:30 • 2min
G-Node: A Capability Based Componentized Operating Systems Framework
26:23 • 2min
The Challenges of Expanding Formalization Beyond a Tight Container
28:07 • 2min
How to Scale Up a Trust Computing System
30:21 • 5min
The Role of Language Support in Vulnerability Reduction
35:46 • 4min
FUSO: A Bottom Operating System
40:10 • 2min
How to Carve Out the Trust Boundary From Linux
42:13 • 3min
The Importance of User Interface Security
44:56 • 5min
The Importance of OCAPs in Security
49:48 • 5min
The Benefits of OCAHPS
54:34 • 2min
The Importance of Object Capabilities as a Paradigm
56:23 • 4min
The Importance of Revocation in the SEO Force
01:00:30 • 2min
The Importance of Capabilities in Distributed Systems
01:02:42 • 3min
The Blockchain Ecosystem as a Source of Hope
01:05:59 • 5min
The Genetic Takeover of Blockchain
01:10:58 • 2min
The Role of AI in Cyber Security
01:12:52 • 3min
The Impact of Ransomware on the Market Failure
01:15:38 • 3min
The Problem With Hardware Supply Chain Attacks
01:18:55 • 2min
The Problem With Unavoidable Variations in Manufacturing
01:21:08 • 3min
The Threat of Supply Chain Attacks on Chips
01:24:21 • 4min
The Potential Market for Blockchain
01:28:19 • 5min
The Importance of Secure Enclaves
01:33:21 • 4min
The Implications of Distributed System Security
01:37:14 • 3min
The Importance of Physical and Digital Security
01:40:10 • 3min
The Importance of Perfect Borders in Physical Security
01:43:37 • 4min
The Importance of Semi Permeability in Cryptographic Protocols
01:47:09 • 4min