Matthew Butler

C++ Security Expert

Matthew Butler is a security researcher who has been using C++ professionally since 1990. He has spent the past three decades as a systems architect and software engineer developing systems for network and applications security, real-time data analysis and safety critical systems. He works on platforms ranging from embedded micro-controllers to FPGAs to large-scale, real-time platforms. He is a member of the ISO C++ Standards Committee and is focused on core language features, software vulnerabilities and safety critical systems.

Topic

Topic 1: Using modern C++ to write safe and trustworthy code

Topic 2: What Air Disasters Tell Us About Safety Critical Designs

Content

Topic 1: Using modern C++ to write safe and trustworthy code For the past 30 years, we have dealt with penetrations into secure systems almost exclusively from the software layer: applications and operating systems. With the advent of side channel exploits like Spectre, Meltdown and Foreshadow, hardware designs are now battlefields. In this talk, we’ll look at four real-world hardware attacks that changed the way we think about secure systems and see how hardware exploit strategies drive software exploit strategies. And what that means for the future of Modern C++. We’ll explore four lines of attack: *Roots of Trust, *Side channels exploits, *How physical access creates opportunities, and *How our supply chains often create our greatest vulnerabilities. As the Standards Committee puts the final touches on C++20 this year, we’ll use these as the framework to get an inside look at the committee’s efforts to build a safer, more resilient language. We’ll see: * How new language features, like Concepts, Contracts and Ranges, help (or hurt) our ability to write secure software. * How Undefined Behavior is explicitly used by compiler developers to generate high performance machine code and what that means for software security. * Which proposals coming for C++23, like Zero-overhead deterministic exceptions and secure_clear, will help address some of the worst vulnerabilities in the language. This talk is about how our language and design choices affect our system’s ability to withstand attack. It’s also about how the evolution of the language is addressing the insecure world it operates in and the places where it still falls short.

Topic 2: What Air Disasters Tell Us About Safety Critical Designs I take three air crashes and analyze the reasons for them and use those lessons to talk about safety critical systems, fail safe designs, best practices and “The Four Corners Of Critical Systems Design”. I also tell them about what the ISO committee is doing for safety critical development.