calender
Date & Time
Search
Datum
{{range.dates[index].day}}
{{range.dates[index].date}}
Time
Mornings Noon Afternoons Evenings
  • from
  • to
  • o'clock
Topic
Event
Properties
{{item.name}}
{{item.name}}
Exhibition venue

(please choose the desired areas)

Lecture language
Format

Event database

The event database contains all event-related information for the digital electronica conference and supporting event program.

Back to the EventList

Reducing the Attack Surface by Abstract Interpretation

NOV
10
2020
10. NOV 2020

Lecture IoT Device Security Forum

06:00-23:55 h | virtual - on demand

Static code analysis is a widely used technique to demonstrate compliance to coding guidelines, such as MISRA C/C++ or SEI CERT C. Another aspect is to find critical programming defects, and even demonstrate their absence: abstract interpretation-based analyzers can guarantee to detect all code defects due to runtime errors, including buffer overflows, data races, and stack overflows. Static taint analysis can track the impact of data corruption and detect SPECTRE v1, v1.1, and SplitSpectre vulnerabilities. The talk gives an overview of abstract interpretation, reports on practical experience, and discusses its contribution to security by design for IoT devices.

Subjects: Cyber Security

Speaker: Daniel Kästner (AbsInt Angewandte Informatik)

Type: Lecture

Speech: English

Static code analysis is a widely used technique to demonstrate compliance to coding guidelines, such as MISRA C/C++ or SEI CERT C. Another aspect is to find critical programming defects, and even demonstrate their absence: abstract interpretation-based analyzers can guarantee to detect all code defects due to runtime errors, including buffer overflows, data races, and stack overflows. Static taint analysis can track the impact of data corruption and detect SPECTRE v1, v1.1, and SplitSpectre vulnerabilities. The talk gives an overview of abstract interpretation, reports on practical experience, and discusses its contribution to security by design for IoT devices.

Daniel Kästner

Daniel Kästner

AbsInt Angewandte Informatik

Show Profile

Informations

Daniel Kästner
Daniel Kästner
CTO

Location

Eingang
Nord-West
ICM
Eingang
Nord
Eingang
West
Atrium
Eingang
Nord-Ost
Eingang
Ost
Conference
Center Nord
Freigelände
C1
C2
C3
C4
C5
C6
B0
B1
B2
B3
B4
B5
B6
A1
A2
A3
A4
A5
A6