Defenders have 100% knowledge of their verification coverage. They can put a 
SMT solver in their continuous integration pipeline and flag all code not 
verified for removal.

Restraint in only shipping verified code is the silver bullet. 

> On Jan 18, 2017, at 9:27 PM, Tony Arcieri <basc...@gmail.com> wrote:
> 
>> On Wed, Jan 18, 2017 at 2:12 PM, Taylor Hornby <tay...@defuse.ca> wrote:
>> Less ambitiously, we can ask if complexity theory has anything to say
>> about simpler aspects of life. One of them is the attacker-defender arms
>> race in computer security. [...] Most of us are optimistic for
>> "silver bullet" discoveries that make doing computer security a LOT
>> easier [...] I'm curious if part (1) of my thesis really is accurate.
> 
> I doubt it, and I say this as a more-than-decade-long fan of "perfect 
> defense". I don't think perfect defense is possible. I think the reality is 
> there's a lot of low-hanging fruit that can be addressed by better methods, 
> but to put it in Ghost in the Shell terms attack surface is "vast and 
> infinite", and attacks only get better.
> 
> I don't see the cat and mouse game going away any time soon, but perhaps 
> we'll get better at achieving "punctuated equilibrium" where defenders are 
> able to reach some sort of brief reprieve in certain classes of attacks and 
> provide extremely strong defenses as a sort of local maximum. That is, until 
> some paradigm-changing attack comes crashing down, and forces everyone to 
> rethink their entire approach to security.
> 
> -- 
> Tony Arcieri
> _______________________________________________
> langsec-discuss mailing list
> langsec-discuss@mail.langsec.org
> https://mail.langsec.org/cgi-bin/mailman/listinfo/langsec-discuss
_______________________________________________
langsec-discuss mailing list
langsec-discuss@mail.langsec.org
https://mail.langsec.org/cgi-bin/mailman/listinfo/langsec-discuss

Reply via email to