> Seeking perfect correctness as an approach to security is a fool's
> errand. Security is designing systems that can tolerate imperfect software.
>
Exactly. On "Curb Your Enthusiasm" this happened recently. Larry David was
frantically looking for a DVD case, but could not find it.
LD: "I don't
On Sun, 29 Oct 2006, Robert C. Seacord wrote:
> Gadi,
>
> I feel like I've been here before, but I'll give it another shot anyway.
>
> > Okay, than let's make some progress:
> > 1. Where and who is currently involved with doing this?
> > 2. What are they doing?
> > 3. Can we use their experience
Members of this list might be interested in an article in this month's IEEE
Computer Journal about the use of automatic and semi-automatic theorem proving
to prove the security of a transaction protocol. The article - which is called
First Steps in the Verified Software Grand Challenge - concerns t
Gadi,
I feel like I've been here before, but I'll give it another shot anyway.
> Okay, than let's make some progress:
> 1. Where and who is currently involved with doing this?
> 2. What are they doing?
> 3. Can we use their experience to make it a larger success?
> 4. How do we begin doing someth