Foresight Institute Radio

Gernot Heiser: Defend Against Cyber Threats | Gaming the Future Chapter 8

Jul 29, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 3min
2
The Meager Adoption Path to SEL4
03:04 • 4min
3
The Role of Secure Computing in Moving Forward
07:15 • 3min
4
SEL4: A Secure Operating System
10:20 • 3min
5
The Importance of Least Authority in SEL4
13:48 • 5min
6
The Benefits of SEO4
19:14 • 5min
7
The Limitations of ACL-4
24:30 • 2min
8
G-Node: A Capability Based Componentized Operating Systems Framework
26:23 • 2min
9
The Challenges of Expanding Formalization Beyond a Tight Container
28:07 • 2min
10
How to Scale Up a Trust Computing System
30:21 • 5min
11
The Role of Language Support in Vulnerability Reduction
35:46 • 4min
12
FUSO: A Bottom Operating System
40:10 • 2min
13
How to Carve Out the Trust Boundary From Linux
42:13 • 3min
14
The Importance of User Interface Security
44:56 • 5min
15
The Importance of OCAPs in Security
49:48 • 5min
16
The Benefits of OCAHPS
54:34 • 2min
17
The Importance of Object Capabilities as a Paradigm
56:23 • 4min
18
The Importance of Revocation in the SEO Force
01:00:30 • 2min
19
The Importance of Capabilities in Distributed Systems
01:02:42 • 3min
20
The Blockchain Ecosystem as a Source of Hope
01:05:59 • 5min
21
The Genetic Takeover of Blockchain
01:10:58 • 2min
22
The Role of AI in Cyber Security
01:12:52 • 3min
23
The Impact of Ransomware on the Market Failure
01:15:38 • 3min
24
The Problem With Hardware Supply Chain Attacks
01:18:55 • 2min
25
The Problem With Unavoidable Variations in Manufacturing
01:21:08 • 3min
26
The Threat of Supply Chain Attacks on Chips
01:24:21 • 4min
27
The Potential Market for Blockchain
01:28:19 • 5min
28
The Importance of Secure Enclaves
01:33:21 • 4min
29
The Implications of Distributed System Security
01:37:14 • 3min
30
The Importance of Physical and Digital Security
01:40:10 • 3min
31
The Importance of Perfect Borders in Physical Security
01:43:37 • 4min
32
The Importance of Semi Permeability in Cryptographic Protocols
01:47:09 • 4min