Talks

Memory Safety and the Future of Vulnerabilities

As memory safety becomes more popular, and the active development of code in memory unsafe by default languages slows, the balance of vulnerabilities will likely shift away from weaknesses like buffer overflows and use-after-free. In this talk, I cover some interesting other kinds of vulnerabilities that may become more relevant over the next decades.

Software Identity in the Vulnerability Management Ecosystem

Participated in panel at VulnCon 2025 on April 08, 2025
As vulnerabilities proliferate in an evolving and complex ecosystem, software identity remains a fundamental challenge in vulnerability management. This panel, "Software Identity in the Vulnerability Management Ecosystem," convenes distinguished experts from industry and government to cover such efforts as CPE, pURL, OmniBOR, and others to dissect the current and future dynamics of software identity standards and practices. Acknowledging the reality of a multi-identifier ecosystem, the discussion will cover a variety of topics including the integration of software identification data elements into the Common Vulnerabilities and Exposures (CVE) Record, exploring both the challenges and opportunities this presents. Panelists will debate and offers diverse perspectives on what success looks like in managing software identity within the enterprise and across industry. Attendees will gain valuable insights into ongoing standards development and the strategic importance of software identification across the vulnerability management ecosystem.

A Tale of Teaching Rust

Presented at RustConf 2017 on August 19, 2017 Watch the Recording View the Slides
Rust has a reputation of having a very steep learning curve, but is this reputation justified? In this talk I share my experiences teaching Rust to a group of 26 undergraduates as part of a class on programming language theory. None of the students knew Rust going in. Most knew only one language. I walk through the key concepts from Rust that programmers in all languages can use, and that language designers may want to steal, and I talk about how this class of fledgling programmers handled and understood those concepts, what they think of Rust now, and what all of this might mean for teaching Rust effectively in the future.

Hello and Welcome: Documentation in the Rust Ecosystem

Presented at Rust Belt Rust 2016 on October 28, 2016 Watch the Recording View the Slides
Documentation is important. It lowers the barrier for newcomers to use and understand libraries. It helps train and prepare new contributors. It opens up avenues of contribution that go beyond writing code. It makes open source more open, and makes libraries better by its existence. Rust has all the makings of a great ecosystem of well-documented libraries: a high-quality and ever-improving documentation generator ships with the compiler, and the language team leads by example with a strong focus on documentation. Yet the quality and availability of documentation for Rust crates remains spotty, with many crates providing incomplete documentation, or relying on the types they expose to describe their use and function. This talk takes an in-depth look at the state of documentation in the Rust ecosystem today—including how many crates provide easily-located documentation, and how complete that documentation is—and then describes ideas for improvement, including improvements to Rust's documentation-related tools and ideas for crate maintainers to both write better docs themselves and to encourage contributions from others via documentation-focused mentorship.

Copyright Andrew Lilley Brinker. Made with in California