Risks of Trusting the Physics of Sensors

( )

Risks of Trusting the Physics of Sensors By Kevin Fu and Wenyuan Xu Communications of the ACM, Vol. 61 No. 2, Pages 20-23

( )

Kevin Fu is Associate Professor of Electrical Engineering and Computer Science at the University of Michigan.

Wenyuan Xu is Professor and Chair of the Department of Systems Science and Engineering at Zhejiang University.

And I love this:

Security is a system property. Thus, design of a sensor-driven, safety-critical system deserves supervision by a systems engineer with broad knowledge of computer security risks. Team leaders for such systems will need to master skills from physics, electrical engineering, and mechanical engineering to computer science, information science, public policy, and ethics.
...
The notion of interdisciplinary education is not new to computer science. In the 1990s, the software engineering community debated a shift toward interdisciplinary education beyond the confines of computer science.10,11 Similarly, a good engineer for embedded security will not simply be a good computer scientist or a good programmer. Interdisciplinary education and teamwork is key to ensuring security of sensor-driven, safety-critical systems.

BeyondCorp: A New Approach to Enterprise Security

( )

! I think is a continuation of the work the Jericho Forum123 was doing back in the early mid 00’s when talking about perimeter-less networks and open-network environments. I think Google is doing some fascinating and useful work here and they are self-dog fooding. I expect they have all the data to prove their point of view. I'm doubtful that many CISO are ready to embrace this and even if they are, maybe reluctant to bring it before their organizations's board.


  1. The Jericho Forum, April 2006. Architecture for De-perimeterisation. Retrieved April 2007, from The Jericho Forum 
  2. The Jericho Forum, January 2007. Business Rationale for De-perimeterisation. Retrieved April 2007, from The Jericho Forum 
  3. Simmonds, P. (2004, July 28-29). This Decade's Security Challenge. Retrieved August 2007, from Blackhat Las Vegas 2004