Presentation is loading. Please wait.

Presentation is loading. Please wait.

Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22

Similar presentations


Presentation on theme: "Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22"— Presentation transcript:

1 Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22
SE and the IoT Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22

2

3

4

5

6 The major cause of the software crisis is that the machines have become several orders of magnitude more powerful! To put it quite bluntly: as long as there were no machines, programming was no problem at all; when we had a few weak computers, program-ming became a mild problem, and now we have gigantic computers, programming has become an equally gigantic problem. — Edsger Dijkstra, The Humble Programmer (EWD340), Communications of the ACM

7

8 A New Software Crisis

9

10 A New Software Crisis?

11

12 Tesla P85D

13 Tesla P85D Data is hidden in firmware Customer has access to the data
Company has remote access New firmware fixes charging bug

14

15 A New Software Crisis

16 Tesla P85D Development Release Feedback Change Security/Privacy

17 What?

18

19 Definitions The Internet of Things is a network of physical objects connected to and access through the Internet The things contain hardware and software to allow them to interact with the external environment and to let them and users interact with one another

20

21 Why?

22 Usages Monitor things Predict usages Optimise consumption
Manage life-cycle

23 The value of a telecommunications network is proportional to the square of the number of connected users of the system (n2). —Robert Metcalfe, c (attributed by George Gilder in 1993)

24 “[E]ven Metcalfe's law understates the value created by a group-forming network [GFN] as it grows. […] [T]he value of a GFN increases exponentially, in proportion to 2n.” —David P. Reed, "The Law of the Pack" (Harvard Business Review, Feb. 2001,) But contrast with

25 Socialisation of everything

26

27 When?

28

29 news.softpedia.com/news/New-Infographic-Boosts-Your-Smartwatch-Knowledge shtml

30

31 Tesla P85D

32

33 How?

34 Usage Integration Construction

35 Usage

36 Integration

37 Construction

38 Conclusion

39 A New Software Crisis

40 Problems?

41 Solutions?

42 Solutions? Reactivity, scalability, configurability, resource consumption, robustness Methods and development techniques Architectures, interoperability

43 Solutions? Development tools, frameworks, platforms
Continuous delivery and integration Verification and validation

44 A New Software Crisis


Download ppt "Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22"

Similar presentations


Ads by Google