med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

373
active users

#swsec

0 posts0 participants0 posts today

A talk I watched about CI/CD security highlights an unfortunate collective tunnel vision with the way organizations are working in the #swsec field. Many practitioners call til Application Security(AppSec). A problem with this term is that it implies that we're securing "applications", like web applications or mobile apps. However, software is everywhere, and this focus seems to make us ignore the bigger picture. @cigitalgem has been talking about this problem for ages and it's still happening

Continued thread

I think this part about software security is particularly interesting in the days of vibes, AI coding assistants and devs claiming they are 32x more productive (LOL). This surely means they are checking in at least 32 times as many vulnerabilities. To top it off, none of the vibe coders understand their code, so good luck fixing it! I guess fixing it is just another prompt and turtles all the way down. Ofc building security in becomes a long lost dream at this point

Doing some informal research for a talk about software security. Inspired by Dan Geer's old work, I did some exploratory data analysis. I plotted an estimate of lines of code (in millions) in the Linux kernel against the square root of vulnerabilities reported. Lines include the core as well as drivers etc. I think this graph supports the old observation that number of vulnerabilities reported the following year correlates with the square of MLoC at a given year

This notion that early-career coders can be replaced by AI is wrong. Nobody is thinking about maintaining software or the architectural disaster to come when inscrutable code that mostly works is all over the codebase. And it's real..."early-career coders have been hit especially hard because much of what they do can now be done by AI."

I recommend hiring junior humans over AI. Still. Just tool them up.

#ML #AI #MLsec #swsec

wsj.com/lifestyle/careers/tech

Welcome to 1998! Please see David Wagner about your very broken code. Static analysis tools will automatically find these bugs starting about 1998 for...27 years! That is, in 2025 we will have had code checkers around for just about 30 years.

We also know how to use better programming languages than C and C++.

Way to go government!

#swsec #appsec

infosecurity-magazine.com/news

Infosecurity Magazine · CISA and FBI Warn Against Buffer Overflow VulnerabilitiesBy Alessandro Mascellino

My first big DARPA grant was about testing for buffer overflows automatically. It led directly to the static analysis tools that everyone uses today (which we also pioneered for DARPA). That was 1995.

How many decades can you hold your breath? #swsec #appsec
theregister.com/2025/02/13/fbi

The Register · Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilitiesBy Jessica Lyons