{"id":213,"date":"2014-11-30T16:17:07","date_gmt":"2014-11-30T16:17:07","guid":{"rendered":"https:\/\/blogs.ncl.ac.uk\/security\/?p=213"},"modified":"2014-11-30T16:17:07","modified_gmt":"2014-11-30T16:17:07","slug":"designing-reliable-systems-versus-finding-security-holes","status":"publish","type":"post","link":"https:\/\/blogs.ncl.ac.uk\/security\/2014\/11\/30\/designing-reliable-systems-versus-finding-security-holes\/","title":{"rendered":"Designing Reliable Systems versus Finding Security Holes"},"content":{"rendered":"<p>At various presentations and also in\u00a0our research on credit cards I came across approaches for security vulnerability research that are based on tools and techniques for building reliable systems.\u00a0 I\u00a0am\u00a0curious about the relation between the two, and thought maybe a blog is a good venue for people to share some thoughts on the issue.<\/p>\n<p>A\u00a0couple of examples of what I mean:<\/p>\n<p>&#8211; Martin is trying to build a reliable emulator for credit card payment.\u00a0He works with Leo on proofs for reliability.\u00a0Martin essentially follows the Praxis software development approach, in a light-weight incarnation.\u00a0But, as a consequence, he and Leo find security vulnerabilities.\u00a0Shouldn&#8217;t we have used a tool\/method that aims at finding security vulnerabilities instead of one that aims at building reliable systems?\u00a0 Or\u00a0are these somehow\u00a0the same?<\/p>\n<p>&#8211; We recently had a\u00a0colloquium guest speaker\u00a0(recently graduated PhD student) from Glasgow who talked about her research in using safety case description languages to describe case studies\u00a0for security breaches.\u00a0 Such use is almost contrary to what the language was defined for, but it seemed to work.<\/p>\n<p>I&#8217;m interested in the question whether we use existing dependability\/safety techniques for security research because (1) we don&#8217;t have better ones yet or because (2) they are the best ones imaginable.\u00a0 I guess the answer is &#8216;it depends&#8217;, but it struck me as interesting to try to understand this issues more generically and discuss on this blog.\u00a0 So, please comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At various presentations and also in\u00a0our research on credit cards I came across approaches for security vulnerability research that are based on tools and techniques for building reliable systems.\u00a0 I\u00a0am\u00a0curious about the relation between the two, and thought maybe a &hellip; <a href=\"https:\/\/blogs.ncl.ac.uk\/security\/2014\/11\/30\/designing-reliable-systems-versus-finding-security-holes\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5073,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-213","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/5073"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":2,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/213\/revisions\/215"}],"wp:attachment":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}