Michael Koppmann

Typed Security: Preventing Vulnerabilities By Design

What if your type system could be your best security tool? Learn how to encode security rules into types, making entire classes of vulnerabilities simply impossible.

Typed Security: Preventing Vulnerabilities By Design
#1about 3 minutes

Introduction to domain-driven design principles

Domain-driven design (DDD) helps structure code to match the business domain by using concepts like entities, value objects, and aggregates.

#2about 4 minutes

Making illegal states unrepresentable with types

By designing data types so that invalid combinations cannot be expressed, the compiler can prevent bugs and enforce business rules automatically.

#3about 3 minutes

Avoiding null pointer exceptions with optionals

Using the `Optional` type in languages like Java explicitly models the potential absence of a value, forcing developers to handle empty cases.

#4about 2 minutes

Overcoming primitive obsession with custom types

Wrapping primitive types like strings and integers in custom types (e.g., `UserId`) prevents logical errors like mixing up different kinds of IDs.

#5about 9 minutes

Modeling a business workflow with rich types

An email verification process is modeled using smart constructors and sum types, replacing a simple boolean flag to guarantee correctness.

#6about 2 minutes

Applying typed security to OWASP vulnerabilities

Type systems can be used to systematically prevent common security flaws listed in the OWASP Top 10, such as injection and access control issues.

#7about 7 minutes

Using types as authorization tokens

Replacing boolean authorization checks with type-based access tokens ensures that protected functions can only be called after a successful permission check.

#8about 2 minutes

Preventing SQL injection with a query type

Differentiating between a raw string and a dedicated `Query` type at the compiler level prevents accidental string concatenation and forces safe data handling.

#9about 4 minutes

Preventing data leaks with data transfer objects

Data Transfer Objects (DTOs) act as a boundary layer, exposing only necessary and safe data to external clients while protecting sensitive internal models.

#10about 2 minutes

Eliminating XSS with a dedicated HTML type

In frameworks like Elm, treating HTML as a distinct type ensures that all string inputs are automatically sanitized, preventing cross-site scripting attacks.

#11about 2 minutes

Structuring applications with clean architecture

Architectural patterns like Clean or Hexagonal Architecture isolate the pure business logic core from external dependencies, complementing a type-driven approach.

#12about 2 minutes

Key takeaways for building secure applications

The core principles for secure design are to make illegal states unrepresentable, parse instead of just validating, and use the compiler as a security tool.

#13about 17 minutes

Q&A on type systems and legacy code

The speaker answers audience questions about effective languages, limitations, frontend vs backend validation, and applying these concepts to legacy codebases.

Related jobs
Jobs that call for the skills explored in this talk.

test

Milly
Vienna, Austria

Intermediate

test

Milly
Vienna, Austria

Intermediate

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
CH
Chris Heilmann
Dev Digest 134 - Where pixels sing?
News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 134 - Where pixels sing?
CH
Chris Heilmann
Dev Digest 129 - Now that's what I call private data!
News and ArticlesAfter declaring Google a monopoly there are now considerations to force it to break up - isn't that what the whole Alphabet thing was about? In the last act of Crowdstrike coverage here, they released a deep analysis of the outage th...
Dev Digest 129 - Now that's what I call private data!
CH
Chris Heilmann
Dev Digest 112 - The True Crime of AI Development
In last Friday's Dev Digest, we had some great AI news, some worrying security threats and a swipe-aware game in CSS with explanations! News and ArticlesLet's kick off with some AI news. Netflix caused a stir with AI-generated images in a true crime ...
Dev Digest 112 - The True Crime of AI Development

From learning to earning

Jobs that call for the skills explored in this talk.