conference logo

Playlist "28C3: behind enemy lines"

The Science of Insecurity

Meredith L. Patterson and Sergey

Why is the overwhelming majority of common networked software still not secure, despite all effort to the contrary? Why is it almost certain to get exploited so long as attackers can craft its inputs? Why is it the case that no amount of effort seems to be enough to fix software that must speak certain protocols?