Remove Architecture Remove Software Remove Whitepaper
article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

This is why I included interpersonal factors in the Jenga whitepaper.) On the other side is a whiteboard with a software architecture diagram We all have too many tasks, and those where you cant imagine success, or where success seems not worth the price, are ones we want to skip.

article thumbnail

Taming the Wild West of ML: Practical Model Signing with Sigstore

Google Security

We have seen remarkable progress leading to weekly launches of various applications which incorporate ML models to perform tasks ranging from customer support, software development, and even performing security critical tasks. With the advent of LLMs, the ML field has entered an era of rapid evolution.

Risk 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. I also like Figure 27 & 28 (shown), showing risks associated with a generic architecture.

Risk 140
article thumbnail

Securing tomorrow's software: the need for memory safety standards

Google Security

Technologies like ARM's Memory Tagging Extension (MTE) and the Capability Hardware Enhanced RISC Instructions (CHERI) architecture offer a complementary defense, particularly for existing code. This encourages innovation and allows software and hardware manufacturers to adopt the best solutions as they emerge.

article thumbnail

MITRE ATT&CK: The Magic of Application Mitigations

Cisco Security

Today’s application architectures support fast, continuous innovation. Back end architectures use small, independent code modules called microservices. Clearly today’s application architectures use a lot of components, making them more complex, but the benefits run deep. They were simpler, sure, but so are horse-drawn carriages.

article thumbnail

A Spectre proof-of-concept for a Spectre-proof web

Google Security

We've confirmed that this proof-of-concept, or its variants, function across a variety of operating systems, processor architectures, and hardware generations. In 2019, the team responsible for V8, Chrome’s JavaScript engine, published a blog post and whitepaper concluding that such attacks can’t be reliably mitigated at the software level.

article thumbnail

Qualities of a Highly Available Cloud

McAfee

Instead, the best of breed functionality was purposefully reconstructed for SSE, using a microservices architecture that can scale elastically, and built on a platform-neutral stack that can run on bare metal and public cloud, equally effectively. From the start, the architecture was designed with zero trust in mind.