<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Soma</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Soma"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Soma"/>
	<updated>2026-04-22T07:14:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_21&amp;diff=25048</id>
		<title>EvoSec 2025W Lecture 21</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_21&amp;diff=25048"/>
		<updated>2025-03-27T21:23:05Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* Which predictions were the most plausible? implausible?&lt;br /&gt;
* What relevant advancements/developments (technical or otherwise) were missed in the timeline that could change the envisioned trajectory?&lt;br /&gt;
* What can we do to avoid a blockcloud apocalypse?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 21&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - plausible: online misinformation tool, dead internet theory&lt;br /&gt;
 - implausible: cryptocurrency takeover, AI as the silver lining?&lt;br /&gt;
 - advancements missed: LLMs, breaking crypto&lt;br /&gt;
 - need to trust each other more, decentralize trust, IRL interactions&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - implausible: separate IoT cloud services, online misinformation tools&lt;br /&gt;
    (stuff to manipulate algorithms, generate content)&lt;br /&gt;
 - plausible: everything on the cloud, storage-&amp;gt;computation, apps&lt;br /&gt;
 - not clear large govts using blockchain&lt;br /&gt;
 - missed LLMs&lt;br /&gt;
 - expertise gap between law/policy and AI/modern computer tech&lt;br /&gt;
 - avoid BA through policy, but maybe not avoidable (go to the woods)&lt;br /&gt;
 - plausible that AI will do more legal stuff&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - plausible: cloud providers became govts, blockchain shift&lt;br /&gt;
 - implausible: AI worms attacking blockchains&lt;br /&gt;
 - real trust still relies on people, not just systems&lt;br /&gt;
 - missed advancements: improvements in security tech, improvements to privacy&lt;br /&gt;
   preserving tech, federated learning&lt;br /&gt;
 - no easy technological solution to these problems, solution will be&lt;br /&gt;
   on the policy side, will be social&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How plausible are widespread worms?&lt;br /&gt;
 - social, not technical factors&lt;br /&gt;
&lt;br /&gt;
How to avoid&lt;br /&gt;
 - take evolution &amp;amp; trust seriously&lt;br /&gt;
 - educate policy makers&lt;br /&gt;
   - tell better stories about security&lt;br /&gt;
   - we need to tell ourselves better stories&lt;br /&gt;
&lt;br /&gt;
- computers allow us to process, communicate, distribute information&lt;br /&gt;
  - allows for social connections to be scaled&lt;br /&gt;
    (bureaucracy to be scaled)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There&#039;s a reason computers were first adopted by large businesses &amp;amp; govts&lt;br /&gt;
 - had the need to process information to run their bureaucracies&lt;br /&gt;
&lt;br /&gt;
what is a bureaucracy?&lt;br /&gt;
 - infrastructure for organizing the activities of people&lt;br /&gt;
&lt;br /&gt;
the constraints of distributed computation also apply to groups of people&lt;br /&gt;
&lt;br /&gt;
With the introduction of computers, we&#039;ve made processes for organizing society&lt;br /&gt;
that are more computer-focused (and org-focused) rather than socially focused&lt;br /&gt;
 (satisfying needs of people)&lt;br /&gt;
&lt;br /&gt;
online dating&lt;br /&gt;
 - it is the way it is, because that&#039;s what maximizes engagement&lt;br /&gt;
   - need lots of users having lots of engagement&lt;br /&gt;
   - no incentive for short interactions that lead to satisfying outcomes&lt;br /&gt;
&lt;br /&gt;
it isn&#039;t just dating&lt;br /&gt;
 - we want scalable technical systems to maximize economic opportunity for&lt;br /&gt;
   the companies&lt;br /&gt;
    - not necessarily to the advantage of individuals or society&lt;br /&gt;
&lt;br /&gt;
Consider search&lt;br /&gt;
 - over what data? the right data, or all data?&lt;br /&gt;
   - is it worth curating data?&lt;br /&gt;
   - what data is worth indexing?&lt;br /&gt;
&lt;br /&gt;
Why does Google index AI-generated slop?&lt;br /&gt;
 - what would it take to avoid doing this?&lt;br /&gt;
&lt;br /&gt;
crawling the web blindly made sense when the web was mostly legit pages&lt;br /&gt;
 - but if it is full of crap, that isn&#039;t a good strategy&lt;br /&gt;
&lt;br /&gt;
But WHY is the web filled with crap?&lt;br /&gt;
 - because that content can be monetized&lt;br /&gt;
 - Google created this problem!&lt;br /&gt;
&lt;br /&gt;
If there was more friction in having ads on pages or in getting pages indexed,&lt;br /&gt;
we wouldn&#039;t have the AI generated web page problem&lt;br /&gt;
 - would be too difficult&lt;br /&gt;
&lt;br /&gt;
newspaper ads were never so easy to place&lt;br /&gt;
 - even classifieds&lt;br /&gt;
&lt;br /&gt;
when a third party can disintermediate trust, and they have few incentives to make sure parties act in trustworthy ways...you get a lot of anti-social behavior&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_21&amp;diff=25047</id>
		<title>EvoSec 2025W Lecture 21</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_21&amp;diff=25047"/>
		<updated>2025-03-27T15:26:14Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]  ==Discussion Questions==  * Which predictions were the most plausible? implausible? * What relevant advancements/developments (technical or otherwise) were missed in the timeline that could change the envisioned trajectory? * What can we do to avoid a blockcloud apocalypse?  ==Notes==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* Which predictions were the most plausible? implausible?&lt;br /&gt;
* What relevant advancements/developments (technical or otherwise) were missed in the timeline that could change the envisioned trajectory?&lt;br /&gt;
* What can we do to avoid a blockcloud apocalypse?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_20&amp;diff=25046</id>
		<title>EvoSec 2025W Lecture 20</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_20&amp;diff=25046"/>
		<updated>2025-03-25T18:53:02Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How does evolution relate to biologically-inspired security?&lt;br /&gt;
* How does trust relate to biologically-inspired security?&lt;br /&gt;
* What do you think of the panel question &amp;quot;Is there anything left to learn?&amp;quot; Is it the right question to ask about biologically-inspired security?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 20&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - biology has created working security systems, so reasonable to try replicating&lt;br /&gt;
 - trust is the basis of everything, including bio-inspired security&lt;br /&gt;
 - question is a bit stubborn&lt;br /&gt;
   - hasn&#039;t been good for past scientists who have said this&lt;br /&gt;
 - was more &amp;quot;what&#039;s next to learn&amp;quot;&lt;br /&gt;
 - how can you replicate vaccines in computers?&lt;br /&gt;
   - computer vaccines would also have to change over time in response&lt;br /&gt;
     to attacker innovation&lt;br /&gt;
   - &amp;quot;inactivated malware&amp;quot;?&lt;br /&gt;
 - barely scratched the surface of how the brain works, so still lots to learn&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - evolution is a testbed for security mechanisms in biology&lt;br /&gt;
 - biological entities don&#039;t protect secrets&lt;br /&gt;
 - we keep learning more about biology&lt;br /&gt;
 - what is the purpose of learning from biology?&lt;br /&gt;
 - we&#039;ve pulled in the big concepts, so we may be on the downward slope&lt;br /&gt;
   - focus on more niche features of biology&lt;br /&gt;
   - we&#039;ve used the big ones&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - bio-inspired security is based on a system that evolved, so is related to evolution&lt;br /&gt;
 - trust arises in how malicious activities can be detected and stopped while normal system functioning is allowed to proceed&lt;br /&gt;
 - question is what is left to learn&lt;br /&gt;
 - gap between fields seems to be growing, not much communication&lt;br /&gt;
 - lots of crossover between other fields, why isn&#039;t it there in security?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Project presentations&lt;br /&gt;
 - 5-10 minute presentations&lt;br /&gt;
 - just present your project&lt;br /&gt;
   - basic idea&lt;br /&gt;
   - what you&#039;ve done&lt;br /&gt;
   - what you&#039;re going to do&lt;br /&gt;
 - make sure to spend 1-2 slides explaining the research problem/area&lt;br /&gt;
   - why are you doing this work?&lt;br /&gt;
 - for the literature review part, give a high-level overview&lt;br /&gt;
   of past work&lt;br /&gt;
 - for proposals, do a brief lit review (1-2 slides) then describe&lt;br /&gt;
   your proposed research&lt;br /&gt;
 - have between 5-10 slides&lt;br /&gt;
   - 5 is probably enough&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 - &amp;quot;Principles&amp;quot; was my first first-author publication&lt;br /&gt;
   - the principles part holds up today in terms of &amp;quot;what is cool&amp;quot; about&lt;br /&gt;
     immunology from a computer security perspective&lt;br /&gt;
 - Panel came out of a rejected paper&lt;br /&gt;
   - bit of a consolation prize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
No &amp;quot;subsystem&amp;quot; in biology does exactly what you think it does&lt;br /&gt;
 - the systems evolved, they weren&#039;t designed&lt;br /&gt;
 - so no clear separation of concerns&lt;br /&gt;
 - immune system is for maintaining homeostasis, not &amp;quot;security&amp;quot;&lt;br /&gt;
   - co-existence is always an option&lt;br /&gt;
 - immune system is also a &amp;quot;distributed nervous system&amp;quot;&lt;br /&gt;
   - neurotransmitters are similar or are the same as the chemicals that&lt;br /&gt;
     immune cells use to communicate&lt;br /&gt;
&lt;br /&gt;
When we talk about &amp;quot;bio inspired security&amp;quot; or any cross-disciplinary work,&lt;br /&gt;
we are comparing models to models&lt;br /&gt;
 - mapping models onto models is a subtle business&lt;br /&gt;
 - can often lead to more confusion than clarity&lt;br /&gt;
&lt;br /&gt;
living systems evolved, so they survived in the face of evolving threats&lt;br /&gt;
 - neat trick to learn for computer security!&lt;br /&gt;
 - but...do we understand how they evolved?&lt;br /&gt;
&lt;br /&gt;
Rather than metaphors, I want to get at underlying principles&lt;br /&gt;
 - solid foundations rather than shaky mappings&lt;br /&gt;
&lt;br /&gt;
That foundation is clearly evolution, at least in part&lt;br /&gt;
 - but I think we got evolution wrong&lt;br /&gt;
&lt;br /&gt;
evolution (to me) is an interplay between cooperation and conflict&lt;br /&gt;
 - cooperation is a key survival strategy&lt;br /&gt;
 - but cooperation is only safe if it is with those you trust&lt;br /&gt;
   - those who won&#039;t betray you for personal or short-term gain&lt;br /&gt;
 &lt;br /&gt;
The central problem of computer security is making sure systems cooperate&lt;br /&gt;
only with those who are trustworthy&lt;br /&gt;
 - more than &amp;quot;authorized&amp;quot; as credentials can be compromised&lt;br /&gt;
&lt;br /&gt;
so from this perspective, computer security IS the problem of how to evolve computers in a world where trust isn&#039;t assumed&lt;br /&gt;
&lt;br /&gt;
(note we mostly assume code, systems, services are trustworthy and thus can be trusted, and when they aren&#039;t our systems just break horribly)&lt;br /&gt;
&lt;br /&gt;
bio-inspired security is the process of learning from systems that don&#039;t assume trust - how can they be built, how can they work?&lt;br /&gt;
 - but living systems are interesting just to the extent they are examples of such systems&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_20&amp;diff=25045</id>
		<title>EvoSec 2025W Lecture 20</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_20&amp;diff=25045"/>
		<updated>2025-03-25T15:30:13Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]  ==Discussion Questions==  * How does evolution relate to biologically-inspired security? * How does trust relate to biologically-inspired sec...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How does evolution relate to biologically-inspired security?&lt;br /&gt;
* How does trust relate to biologically-inspired security?&lt;br /&gt;
* What do you think of the panel question &amp;quot;Is there anything left to learn?&amp;quot; Is it the right question to ask about biologically-inspired security?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_19&amp;diff=25044</id>
		<title>EvoSec 2025W Lecture 19</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_19&amp;diff=25044"/>
		<updated>2025-03-20T17:40:54Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, &amp;quot;bpfbox: Simple Precise Process Confinement with eBPF.&amp;quot; (CCSW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, &amp;quot;Bpfcontain: Fixing the soft underbelly of container security.&amp;quot; (arXiv 2021)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* Is the complexity of Linux security mechanisms due more to functional requirements or evolutionary processes?&lt;br /&gt;
* What is the relationship between trust and confinement?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 19&lt;br /&gt;
----------&lt;br /&gt;
G1&lt;br /&gt;
 - complexity more from evolution, not design&lt;br /&gt;
 - open source software dev follows patterns of evolution&lt;br /&gt;
 - confinement is a tool for trust: more confinement, less trust&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - complexity comes more from functional requirements&lt;br /&gt;
   - individuals find problem with existing mechanisms and then add something&lt;br /&gt;
     to fix things&lt;br /&gt;
   - adding leads to complexity&lt;br /&gt;
 - you have to trust that the confinement mechanisms work&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - complexity more comes from evolution not design&lt;br /&gt;
   - you have to keep modifying what you have&lt;br /&gt;
   - complexity arises from the need for compatibility, not change what is there&lt;br /&gt;
 - specifying confinement is a reverse way of producing a model of behavior&lt;br /&gt;
   - no need to understand any particular user&#039;s behavior pattern&lt;br /&gt;
&lt;br /&gt;
confinement as a problem&lt;br /&gt;
 - limiting what code can do&lt;br /&gt;
 - limits are in part based on trustworthiness of code&lt;br /&gt;
&lt;br /&gt;
confinement isn&#039;t absolute&lt;br /&gt;
 - because that limits cooperation, integration&lt;br /&gt;
&lt;br /&gt;
but it is necessary&lt;br /&gt;
 - because otherwise errors and attacks propagate&lt;br /&gt;
 - too difficult for developers to understand, work with&lt;br /&gt;
 - also too complex, spaghetti code&lt;br /&gt;
&lt;br /&gt;
Confinement is a fundamental property of modern operating systems&lt;br /&gt;
 - files separate data&lt;br /&gt;
 - processes separate code execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
process is a running program&lt;br /&gt;
 - own virtual cpu&lt;br /&gt;
 - own virtual memory&lt;br /&gt;
&lt;br /&gt;
traditional operating systems don&#039;t do that good of a job of confining processes&lt;br /&gt;
 - because they are often used as components in larger computations&lt;br /&gt;
 - shared files, pipes, sockets, shared memory&lt;br /&gt;
&lt;br /&gt;
but what if you want to run programs that you don&#039;t trust?&lt;br /&gt;
 - full confinement =&amp;gt; sandboxing (e.g., JavaScript sandbox)&lt;br /&gt;
&lt;br /&gt;
Originally OS virtualization was just a way to share a kernel between multiple userlands from different individuals (e.g., web hosting)&lt;br /&gt;
&lt;br /&gt;
Containers became popular as a means for deploying software&lt;br /&gt;
 - for systems administration purposes, not security&lt;br /&gt;
 - because a container has all the local dependencies for any app&lt;br /&gt;
&lt;br /&gt;
devops is enabled by containers&lt;br /&gt;
 - developers make the containers, and those containers can be directly deployed&lt;br /&gt;
&lt;br /&gt;
virtual machines became the unit of resource allocation and security&lt;br /&gt;
 - mimicking the boundaries of a physical computer&lt;br /&gt;
&lt;br /&gt;
Why do we need a hypervisor to multiplex kernels for security, can&#039;t we just&lt;br /&gt;
have a kernel multiplex and confine containers securely?&lt;br /&gt;
&lt;br /&gt;
so why didn&#039;t we push bpfcontain more?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_19&amp;diff=25043</id>
		<title>EvoSec 2025W Lecture 19</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_19&amp;diff=25043"/>
		<updated>2025-03-20T15:35:07Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, &amp;quot;bpfbox: Simple Precise Process Confinement with eBPF.&amp;quot; (CCSW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, &amp;quot;Bpfcontain: Fixing the soft underbelly of container security.&amp;quot; (arXiv 2021)]  ==Discussion Questions==  * Is the complexity of Linux security mechanisms due more to functional requirements or evolutionary processes? * What is...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, &amp;quot;bpfbox: Simple Precise Process Confinement with eBPF.&amp;quot; (CCSW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, &amp;quot;Bpfcontain: Fixing the soft underbelly of container security.&amp;quot; (arXiv 2021)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* Is the complexity of Linux security mechanisms due more to functional requirements or evolutionary processes?&lt;br /&gt;
* What is the relationship between trust and confinement?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_18&amp;diff=25042</id>
		<title>EvoSec 2025W Lecture 18</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_18&amp;diff=25042"/>
		<updated>2025-03-18T18:36:34Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]  ==Notes== &amp;lt;pre&amp;gt; Lecture 18 ---------- G1  - can be more complex to detect imposters in practice because to do so because 1) you won&amp;#039;t consider it a possibility, and...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 18&lt;br /&gt;
----------&lt;br /&gt;
G1&lt;br /&gt;
 - can be more complex to detect imposters in practice because to do so because 1) you won&#039;t consider it a possibility, and 2) you&#039;d have to act weird&lt;br /&gt;
 - AI chatbots can immitate people given chat history, that could defeat detection attempts&lt;br /&gt;
 - shared history may be the strongest authenticator but isn&#039;t practical (like narrative auth)&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - What&#039;s the connection between these two? Seemed obscure&lt;br /&gt;
   - create new and identifiable contexts for security&lt;br /&gt;
     - security context from code diversity vs shared knowledge/observations&lt;br /&gt;
 - computer-to-computer is not like people-to-people communication, is it even feasible to distinguish them?&lt;br /&gt;
 - similar to encryption, shared secret, but secret is shared context&lt;br /&gt;
 - how complex of models would be required for authentication between computers?&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - doesn&#039;t computer behavior boil down to protocols, so not so much opportunity for unknown shared context?&lt;br /&gt;
   - if one host is compromised, it can be immitated using stolen data&lt;br /&gt;
   - compromised communication allows models to be built up over time&lt;br /&gt;
 - how does the link resolver work?!&lt;br /&gt;
 - is genetic recombination practical?&lt;br /&gt;
   - can you really get more complexity over many generations?&lt;br /&gt;
 - what is the similarity between the papers?&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - knowing the attacker could be there biases the conversation&lt;br /&gt;
   - if you did a more &amp;quot;real world&amp;quot; experiment, would people detect impersonation if not primed? suspect they won&#039;t&lt;br /&gt;
   - in the real world users, if someone knows they&#039;ve been hacked they have other ways of communicating this fact&lt;br /&gt;
 - if defender can train model, attacker can also, and your behavior is harder to change than a password&lt;br /&gt;
 - no mutation of object files, so is this evolution?&lt;br /&gt;
   - how can we do mutation here that would generate novelty?&lt;br /&gt;
   - don&#039;t we still need people? How can this be fully automated?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I don&#039;t see these papers as practical, but evocative&lt;br /&gt;
 - how do people recognize each other when limited to text?&lt;br /&gt;
 - can we have programs sexually reproduce like biological organisms, without&lt;br /&gt;
   being designed for this?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
don&#039;t mistake the abstraction for the implementation&lt;br /&gt;
 - computer-to-computer &amp;quot;conversational&amp;quot; auth would have models of implementation &amp;amp; context-specific details&lt;br /&gt;
   - precise program versions&lt;br /&gt;
   - communication details&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25040</id>
		<title>EvoSec 2025W Lecture 17</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25040"/>
		<updated>2025-03-13T18:45:36Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What does it mean for an attacker to &amp;quot;defeat&amp;quot; (p,n)-gram based traffic clustering?&lt;br /&gt;
* What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?&lt;br /&gt;
* Is ADHIC an anomaly detection algorithm? Can it be used to detect anomalies?&lt;br /&gt;
* How fast is ADHIC compared to other standard clustering algorithms?&lt;br /&gt;
* Is diversity-based traffic management feasible today given that so much traffic is encrypted?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 17&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
* Internet protocols&lt;br /&gt;
* clustering vs classification&lt;br /&gt;
* p,n-grams&lt;br /&gt;
&lt;br /&gt;
best-effort packet delivery&lt;br /&gt;
 - rather than guaranteed delivery&lt;br /&gt;
&lt;br /&gt;
IP - best effort&lt;br /&gt;
TCP - guaranteed delivery&lt;br /&gt;
&lt;br /&gt;
best effort allows for denial of service&lt;br /&gt;
 - can always eliminate DoS with reservations, but only for the chosen few&lt;br /&gt;
&lt;br /&gt;
Unless you make deliberate choices about who gets service, EVERYONE gets poor service when there is too much demand&lt;br /&gt;
&lt;br /&gt;
So how do we deal with denial of service on the Internet today?&lt;br /&gt;
&lt;br /&gt;
Today we mostly manage DoS through content distribution networks (CDNs) of some kind.&lt;br /&gt;
&lt;br /&gt;
A CDN is its own network of servers (an &amp;quot;overlay network&amp;quot; or entirely separate) that distributes &amp;amp; serves data&lt;br /&gt;
&lt;br /&gt;
How do CDNs route traffic?&lt;br /&gt;
 - a form of load balancing, but also prioritization&lt;br /&gt;
   (how much did you pay?)&lt;br /&gt;
 - tends to be on a per-server basis, not per-client&lt;br /&gt;
&lt;br /&gt;
What is normal for the network?&lt;br /&gt;
 - constant level of weirdness!&lt;br /&gt;
&lt;br /&gt;
Internet telescope&lt;br /&gt;
 - reserve a large block of IP addresses that aren&#039;t being used&lt;br /&gt;
 - watch what traffic comes to it&lt;br /&gt;
&lt;br /&gt;
naive anomaly detection on network traffic will have huge false positives&lt;br /&gt;
 - or, your model will be way too general&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today we mostly do the exact opposite&lt;br /&gt;
 - deep packet inspection systems&lt;br /&gt;
   - in the cloud, will analyze decrypted packets&lt;br /&gt;
 - really try to understand traffic using lots of rules, reconstructing flows&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Normally traffic is managed using source IP address, source port, destination IP address, destination port, protocol&lt;br /&gt;
 - but is that all we can look at?&lt;br /&gt;
 - can we use this data in a more generic way, without parsing out flows?&lt;br /&gt;
&lt;br /&gt;
So why p,n-grams?&lt;br /&gt;
&lt;br /&gt;
n-grams is a common way to analyze large amounts of data&lt;br /&gt;
 - n in n-gram is just a length, so a set of fixed-length strings&lt;br /&gt;
&lt;br /&gt;
One idea is to do n-gram analysis on packets (whole packets or just packet headers)&lt;br /&gt;
 - n-gram analysis is relatively slow, have to search entire packet for a match&lt;br /&gt;
&lt;br /&gt;
network routers go through a lot of effort to not look at every byte in a packet&lt;br /&gt;
&lt;br /&gt;
What do routers look at?&lt;br /&gt;
 - source and destination IP addresses&lt;br /&gt;
&lt;br /&gt;
Notice that these are 4 byte (or 16 byte) patterns at fixed offsets in a packet header&lt;br /&gt;
 - p,n-grams are a generalization of source and destination IP addresses&lt;br /&gt;
&lt;br /&gt;
What is the frequency distribution of p,n-grams?&lt;br /&gt;
&lt;br /&gt;
What does it mean for an attacker to &amp;quot;defeat&amp;quot; (p,n)-gram based traffic clustering?&lt;br /&gt;
 - attacker wants to get maximum bandwidth&lt;br /&gt;
 - so, have to get their packets into all the queues, or as many as possible&lt;br /&gt;
 - in order to do that, they have to create packets that have p,n-grams that are being used by every queue (every leaf node in ADHIC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?&lt;br /&gt;
  - inherently privacy preserving, except for bad actors&lt;br /&gt;
&lt;br /&gt;
Is ADHIC an anomaly detection algorithm? Can it be used to detect anomalies?&lt;br /&gt;
&lt;br /&gt;
How fast is ADHIC compared to other standard clustering algorithms?&lt;br /&gt;
&lt;br /&gt;
Is diversity-based traffic management feasible today given that so much traffic is encrypted?&lt;br /&gt;
&lt;br /&gt;
How does this relate to trust?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25039</id>
		<title>EvoSec 2025W Lecture 17</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25039"/>
		<updated>2025-03-13T14:58:47Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Discussion Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What does it mean for an attacker to &amp;quot;defeat&amp;quot; (p,n)-gram based traffic clustering?&lt;br /&gt;
* What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?&lt;br /&gt;
* Is ADHIC an anomaly detection algorithm? Can it be used to detect anomalies?&lt;br /&gt;
* How fast is ADHIC compared to other standard clustering algorithms?&lt;br /&gt;
* Is diversity-based traffic management feasible today given that so much traffic is encrypted?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25038</id>
		<title>EvoSec 2025W Lecture 17</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25038"/>
		<updated>2025-03-13T14:57:12Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Discussion Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What does it mean for an attacker to &amp;quot;defeat&amp;quot; (p,n)-gram based traffic clustering?&lt;br /&gt;
* What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?&lt;br /&gt;
* Is ADHIC an anomaly detection algorithm?&lt;br /&gt;
* How fast is ADHIC compared to other standard clustering algorithms?&lt;br /&gt;
* Is diversity-based traffic management feasible today given that so much traffic is encrypted?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25037</id>
		<title>EvoSec 2025W Lecture 17</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_17&amp;diff=25037"/>
		<updated>2025-03-13T14:25:39Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]  ==Discussion Questions==  ==Notes==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_16&amp;diff=25036</id>
		<title>EvoSec 2025W Lecture 16</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_16&amp;diff=25036"/>
		<updated>2025-03-11T18:20:33Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, &amp;quot;Fine-grained Access Control using Email Social Networks.&amp;quot; (CATX 2013)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
Feel free to only address a subset or none of the following questions in your discussion!&lt;br /&gt;
&lt;br /&gt;
* What does it take to define &amp;quot;normal&amp;quot;? In what contexts is it easier to define normal, and where is it harder?&lt;br /&gt;
* To what extent does improved technology make it easier to distinguish between normal and abnormal behavior in an adversarial context?&lt;br /&gt;
* When are false alarms okay, and when are they bad? (How often do you get alerts today from security systems and how often are these irrelevant?)&lt;br /&gt;
* In general, is it better to look at data or metadata when doing anomaly detection?&lt;br /&gt;
* How does the metadata for modern communication platforms differ from email? How is it similar?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 16&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - defining normal: long term, consistent data collected&lt;br /&gt;
   - hard to define normal if there isn&#039;t enough data (not enough interaction)&lt;br /&gt;
     or consistency&lt;br /&gt;
   - don&#039;t need too much consistency, just need lots of data so the patterns&lt;br /&gt;
     can be extracted&lt;br /&gt;
 - false alarms&lt;br /&gt;
   - notifications from google regarding logins is mostly false alarms but is still useful for maintaining security&lt;br /&gt;
   - but too many notifications for regular activity will lead to users to ignore, so frequency matters&lt;br /&gt;
   - severity also matters, can stress out users for no reason&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - &amp;quot;window length&amp;quot; idea, how to apply generally?&lt;br /&gt;
   - harder to define normal with smaller &amp;amp; smaller window lengths&lt;br /&gt;
   - larger behavior space, more possible actions makes it harder to define normal&lt;br /&gt;
 - false alarms: intensity of alarms matters, how easy to ignore/how concerning&lt;br /&gt;
 - data vs metadata: generally metadata is the way to go&lt;br /&gt;
   - context matters, hard to get context from data&lt;br /&gt;
     (but not always, e.g., topics)&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - LLM/AI could help with looking at data for determining normal/classification&lt;br /&gt;
 - is it good to get all of this data? could be used for impersonation&lt;br /&gt;
 - false alarms&lt;br /&gt;
    - geographic change-based alerts can be reasonable, for example&lt;br /&gt;
    - but could dissuade users from trying new things&lt;br /&gt;
    - 2FA on Carleton email, how useful when done on same device?&lt;br /&gt;
    - not good when it is hard to access important information quickly, interferes with normal tasks&lt;br /&gt;
 - modern platforms track more: typing, geographic info&lt;br /&gt;
    - more invasive&lt;br /&gt;
    - gets confused - IP address is in Toronto but still in Ottawa&lt;br /&gt;
 - assigning tasks/roles - using just email can be too limited&lt;br /&gt;
    - but modern platforms are controlled by large companies, so can see&lt;br /&gt;
      info across apps&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - does better tech make defining normal easier?&lt;br /&gt;
    - not really!&lt;br /&gt;
    - newer tech, newer kinds of abnormalities&lt;br /&gt;
 - still an open problem in machine learning 20 years later!&lt;br /&gt;
    - still not getting great accuracy&lt;br /&gt;
 - machine learning black boxes don&#039;t help so much for anomaly detection&lt;br /&gt;
    - people need to go deeper to derive mathematical relationships&lt;br /&gt;
 - have to look at the metadata to determine attacks, don&#039;t have ground truth&lt;br /&gt;
   (don&#039;t know what is really an attack) most of the time&lt;br /&gt;
 - if attacker has information (e.g., emails), can mask their attacks, hide from detection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Easy to do anomaly detection wrong&lt;br /&gt;
 - focus on modeling everything, rather than what you must model&lt;br /&gt;
 - no clear idea of what &amp;quot;normal&amp;quot; will be&lt;br /&gt;
&lt;br /&gt;
machine learning is best used first as a tool for data exploration&lt;br /&gt;
 - can use in production, but ONLY after you really understand what it does&lt;br /&gt;
 - machine learning isn&#039;t always the best at identifying features!&lt;br /&gt;
    - because it lacks context&lt;br /&gt;
&lt;br /&gt;
to do security well, you need &amp;quot;normal&amp;quot; to be very consistent&lt;br /&gt;
 - which means humans should be able to do the classification relatively easily&lt;br /&gt;
&lt;br /&gt;
So the art of this is to figure out what will be consistent&lt;br /&gt;
 - use domain knowledge &amp;amp; machine learning exploration of data&lt;br /&gt;
&lt;br /&gt;
email archive detection&lt;br /&gt;
 - attacker evasion is either noticable to automated system or user&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work backwards from attacks!&lt;br /&gt;
 - why are they weird?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_16&amp;diff=25035</id>
		<title>EvoSec 2025W Lecture 16</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_16&amp;diff=25035"/>
		<updated>2025-03-11T15:31:29Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, &amp;quot;Fine-grained Access Control using Email Social Networks.&amp;quot; (CATX 2013)]  ==Discussion Questions==  Feel free to only address a subset or none of the following questions in your discussion!  * What does it take to define &amp;quot;normal&amp;quot;? In what contexts is it easi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, &amp;quot;Fine-grained Access Control using Email Social Networks.&amp;quot; (CATX 2013)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
Feel free to only address a subset or none of the following questions in your discussion!&lt;br /&gt;
&lt;br /&gt;
* What does it take to define &amp;quot;normal&amp;quot;? In what contexts is it easier to define normal, and where is it harder?&lt;br /&gt;
* To what extent does improved technology make it easier to distinguish between normal and abnormal behavior in an adversarial context?&lt;br /&gt;
* When are false alarms okay, and when are they bad? (How often do you get alerts today from security systems and how often are these irrelevant?)&lt;br /&gt;
* In general, is it better to look at data or metadata when doing anomaly detection?&lt;br /&gt;
* How does the metadata for modern communication platforms differ from email? How is it similar?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_15&amp;diff=25033</id>
		<title>EvoSec 2025W Lecture 15</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_15&amp;diff=25033"/>
		<updated>2025-03-06T19:21:06Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How different is dating from other introduction problems today?&lt;br /&gt;
* How central is reputation to the problem of CMI? To what extent is reputation scalable?&lt;br /&gt;
* How generalizable is the concept of computer-mediated introductions? Could a search engine be a form of CMI, but for websites, not people? What about advertisements, such as political advertisements?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 15&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - dating is long term, but other introductions are more short term&lt;br /&gt;
   - could star ratings work for dating? probably not...unless looking for hookups&lt;br /&gt;
   - could penalize new daters who have a bad first date&lt;br /&gt;
 - reputation is the primary factor in CMIs&lt;br /&gt;
   - record of many positive interactions -&amp;gt; increased trust&lt;br /&gt;
 - human-&amp;gt;website intro, goes back to narrative auth&lt;br /&gt;
 - website-&amp;gt;website, could use star rep system&lt;br /&gt;
 &lt;br /&gt;
G2&lt;br /&gt;
 - uber closest to online dating, but time duration is very different&lt;br /&gt;
   - amount of trust in dating is much higher than every other CMI&lt;br /&gt;
 - stars definitely influence interactions&lt;br /&gt;
 - behavior depends on context (kid at school vs at home)&lt;br /&gt;
 - search engine is a form of CMI&lt;br /&gt;
 - no matching in the actual ad, but ad targeting is a kind of CMI&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - dating differs in how much info you have to reveal versus other CMI&lt;br /&gt;
 - reputation is central to CMI - uber, ebay, etc&lt;br /&gt;
 - ratings are not so objective in dating&lt;br /&gt;
 - reputation exists all over the place - e.g., online search&lt;br /&gt;
 - CMI is definitely part of online advertisements&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - dating is a game problem: incentives for honesty, minimal communication, and deception depending on the party&lt;br /&gt;
 - what are acceptable lies in an online profile?&lt;br /&gt;
   - applies to other CMI problems&lt;br /&gt;
   - advertisers are willing to fudge the truth!&lt;br /&gt;
 - reputation is the most important factor in CMI&lt;br /&gt;
   - how you calculate trust is very important, flaws will be exploited by adversaries&lt;br /&gt;
 - search engines &amp;amp; advertisements, both CMIs&lt;br /&gt;
   Dating: put out info to get a good match, limit info to maintain safety&lt;br /&gt;
   search engines have different incentives but still there are opposing goals&lt;br /&gt;
 - web sites don&#039;t need to make trust judgements of search engines, different from dating and other CMIs&lt;br /&gt;
&lt;br /&gt;
Question: how could you game dating app reputation systems?&lt;br /&gt;
 - get your friends to join &amp;lt;- difficult to stop&lt;br /&gt;
 - sock puppet accounts &amp;lt;- only if auth can be gamed&lt;br /&gt;
&lt;br /&gt;
Why do we care about reputation? When is it important?&lt;br /&gt;
 - we use it to mitigate risk&lt;br /&gt;
   (placing ourselves in a vulnerable situation)&lt;br /&gt;
 - risk &amp;amp; relative power&lt;br /&gt;
&lt;br /&gt;
Reputation is problematic with the Internet today, I think.&lt;br /&gt;
 - AI&lt;br /&gt;
 - fraudulent reputation signals (e.g., paid reviews, sock puppets)&lt;br /&gt;
 - bots, automated attacks on reputation systems&lt;br /&gt;
&lt;br /&gt;
If reputation doesn&#039;t scale in an evolutionarily stable way&lt;br /&gt;
 - efforts to scale reputation will be attacked and circumvented over time&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_15&amp;diff=25032</id>
		<title>EvoSec 2025W Lecture 15</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_15&amp;diff=25032"/>
		<updated>2025-03-06T16:23:49Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]  ==Discussion Questions==  * How different is dating from other introduction problems today? * How central is reputat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How different is dating from other introduction problems today?&lt;br /&gt;
* How central is reputation to the problem of CMI? To what extent is reputation scalable?&lt;br /&gt;
* How generalizable is the concept of computer-mediated introductions? Could a search engine be a form of CMI, but for websites, not people? What about advertisements, such as political advertisements?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_14&amp;diff=25031</id>
		<title>EvoSec 2025W Lecture 14</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_14&amp;diff=25031"/>
		<updated>2025-03-04T18:48:46Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How quickly can you verify that another person knows the same story that you do? Can someone who doesn&#039;t know the story fool you easily?&lt;br /&gt;
* Are there stories that are known to friends and family but that are not written down anywhere?&lt;br /&gt;
* Could any social media or financial site &amp;quot;tell a story&amp;quot; about your interaction with them that isn&#039;t generally known?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 14&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
If you haven&#039;t finished your early lit review yet, please get it to me by the end of the week&lt;br /&gt;
 - for those who have submitted, I will get you feed back soon!&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - protects against non-targeted attacks but may be more vulnerable to targeted attacks, with LLMs&lt;br /&gt;
 - if the story&#039;s generic may be easy to guess, needs to be different&lt;br /&gt;
 - sibling stories!&lt;br /&gt;
 - your social media feed tells a lot about you, as does your record of financial transactions, can even know you&#039;re pregnant before you do!&lt;br /&gt;
 - narrative authentication allows for better two-way trust, potentially&lt;br /&gt;
 - &amp;quot;sharing a story&amp;quot; could actually involve lots of differences in how the story went&lt;br /&gt;
 &lt;br /&gt;
G2&lt;br /&gt;
 - making up details (and waiting for the &amp;quot;wait a minute&amp;quot; remark) can help you figure out whether someone shares the same story&lt;br /&gt;
 - oral traditions in aboriginal societies&lt;br /&gt;
 - &amp;quot;mandela effect&amp;quot; - misremembering stories collectively&lt;br /&gt;
 - meaningful interactions with a site can lead to interesting stories&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - LLM internal model would be probability based, could be hacked&lt;br /&gt;
   - social engineer details out of people&lt;br /&gt;
   - easiest attacks target people&lt;br /&gt;
 - new security issue, hacking LLMs to bypass authentication!&lt;br /&gt;
 - more complex narratives are more secure but harder to remember&lt;br /&gt;
 - if it&#039;s too much work to create authentication credentials users won&#039;t do it&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - could LLMs guess based on context clues?&lt;br /&gt;
   - 12 year old male with an interest in baseball -&amp;gt; probably a predictable birthday cake&lt;br /&gt;
   - but made-up details could help you catch impersonators but could fool legit people&lt;br /&gt;
   - would need details that people wouldn&#039;t forget&lt;br /&gt;
 - instagram knows who you are creeping&lt;br /&gt;
 - link history can tell a lot, e.g., tell e-commerce site what you are interested in&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do we recognize and trust each other?&lt;br /&gt;
 - and what would it mean for the same approach to apply to computational systems&lt;br /&gt;
&lt;br /&gt;
good narratives implicitly are based on a model of their audience&lt;br /&gt;
 - biased towards &amp;quot;interesting&amp;quot; bits with an &amp;quot;interesting&amp;quot; structure&lt;br /&gt;
 - interesting =&amp;gt; high information content, not knowable just from priors&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_14&amp;diff=25030</id>
		<title>EvoSec 2025W Lecture 14</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_14&amp;diff=25030"/>
		<updated>2025-03-04T16:32:37Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]  ==Discussion Questions==  * How quickly can you verify that another person knows the same story that you do? Can someone who doesn&amp;#039;t know the story fool you easily? * Are there stories that are known to friends and family but that are not written down anywhere? * Could any social media or fina...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* How quickly can you verify that another person knows the same story that you do? Can someone who doesn&#039;t know the story fool you easily?&lt;br /&gt;
* Are there stories that are known to friends and family but that are not written down anywhere?&lt;br /&gt;
* Could any social media or financial site &amp;quot;tell a story&amp;quot; about your interaction with them that isn&#039;t generally known?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25027</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25027"/>
		<updated>2025-03-01T19:39:02Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, &amp;quot;Fine-grained Access Control using Email Social Networks.&amp;quot; (CATX 2013)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, &amp;quot;bpfbox: Simple Precise Process Confinement with eBPF.&amp;quot; (CCSW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, &amp;quot;Bpfcontain: Fixing the soft underbelly of container security.&amp;quot; (arXiv 2021)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25026</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25026"/>
		<updated>2025-03-01T19:38:25Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, &amp;quot;Fine-grained Access Control using Email Social Networks.&amp;quot; (CATX 2013)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, &amp;quot;bpfbox: Simple Precise Process Confinement with eBPF.&amp;quot; (CCSW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, &amp;quot;Bpfcontain: Fixing the soft underbelly of container security.&amp;quot; (arXiv 2021)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25025</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25025"/>
		<updated>2025-03-01T19:20:44Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
UPDATES IN PROGRESS&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, &amp;quot;Principles of a Computer Immune System.&amp;quot; (NSPW 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, &amp;quot;Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?&amp;quot; (NSPW 2008)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25024</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25024"/>
		<updated>2025-03-01T19:15:58Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
UPDATES IN PROGRESS&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, &amp;quot;“Don’t Break My Heart!”: User Security Strategies for Online Dating.&amp;quot; (USEC 2017)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, &amp;quot;Can I believe you?: Establishing Trust in Computer Mediated Introductions.&amp;quot; (NSPW 2017)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25023</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25023"/>
		<updated>2025-03-01T19:12:12Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
UPDATES IN PROGRESS&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25022</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25022"/>
		<updated>2025-03-01T19:11:31Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, &amp;quot;Securing Email Archives through User Modeling.&amp;quot; (ACSAC 2005)]&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, &amp;quot;Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.&amp;quot; (ACNS 2005)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, &amp;quot;NetADHICT: A Tool for Understanding Network Traffic.&amp;quot; (LISA 2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_13&amp;diff=25021</id>
		<title>EvoSec 2025W Lecture 13</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_13&amp;diff=25021"/>
		<updated>2025-02-27T21:56:58Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What is the relationship between trust in medical interventions and clinical trials versus lab experiments?&lt;br /&gt;
* What is the relationship between trust in security interventions and lab experiments currently?&lt;br /&gt;
* For a security trial to be valid, would the product being tested be allowed to have any updates? Or, would the updates themselves be part of the trial?&lt;br /&gt;
* Why do we trust that security technologies actually improve end user or organizational security? Is that trust earned or deserved?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 13&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
 - early lit reviews due on Monday night&lt;br /&gt;
 - you can have extra time if you talk to me first!&lt;br /&gt;
 - I expect this to be a draft that will be revised, so I&#039;m looking for honest effort not perfection (progress towards the final project)&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
--&lt;br /&gt;
 - first two questions were not too clear to us&lt;br /&gt;
 - labs are lower trust environments&lt;br /&gt;
 - clinical trials are higher trust in aggregate&lt;br /&gt;
   - also more organic, more complex&lt;br /&gt;
 - updates should not be allowed during the trial, reduces how controlled the experiment is, more confounding variables&lt;br /&gt;
   - updates =&amp;gt; evaluating people behind product rather than just the product&lt;br /&gt;
   - can you separate company from the product?&lt;br /&gt;
   - past experience with organization may increase trust separate from actual&lt;br /&gt;
     product performance&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
--&lt;br /&gt;
 - clinical trials have much higher level of trust, you&#039;re doing experiments on humans vs cells or animals&lt;br /&gt;
 - updates could be part of a trial but you&#039;d have to restart the trial&lt;br /&gt;
 - computer part of computer security system is more predictable than biological systems&lt;br /&gt;
 - trust should be earned but isn&#039;t in practice&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
--&lt;br /&gt;
 - trials account for population variability beyond what can be done in a lab&lt;br /&gt;
 - relying too much on standard methods can get outdated, making sure tests adapt to the changing real world&lt;br /&gt;
 - could have a subscription module so one group could get updates while the other didn&#039;t&lt;br /&gt;
 - people assume security, that things work, because alternative would be too hard&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
--&lt;br /&gt;
 - maybe updates should be part of the trial, as ability to adapt to new threats is part of what we want to evaluate&lt;br /&gt;
 - which product is most likely to stay up to date with current threats after the trial? the one that was getting consistent updates&lt;br /&gt;
 - products out on the market showed that they work in the past, but new ones are more risky, trust needs to be earned&lt;br /&gt;
 - defective product costs more to run, so experience can help indicate trustworthiness of a security product&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_13&amp;diff=25020</id>
		<title>EvoSec 2025W Lecture 13</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_13&amp;diff=25020"/>
		<updated>2025-02-27T15:28:32Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]  ==Discussion Questions==  * What is the relationship between trust in medical interventions and clinical trials versus lab experiments? * What is the relationship between trust in security interventions and lab experiments currently? * For a security trial to be valid, would the product being tested be allowed...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What is the relationship between trust in medical interventions and clinical trials versus lab experiments?&lt;br /&gt;
* What is the relationship between trust in security interventions and lab experiments currently?&lt;br /&gt;
* For a security trial to be valid, would the product being tested be allowed to have any updates? Or, would the updates themselves be part of the trial?&lt;br /&gt;
* Why do we trust that security technologies actually improve end user or organizational security? Is that trust earned or deserved?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25019</id>
		<title>EvoSec 2025W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25019"/>
		<updated>2025-02-25T18:06:19Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
While these are questions to consider, &#039;&#039;&#039;please focus your discussion on what your group finds interesting related to the paper&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* How do modern security technologies like [https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS CORS], [https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP CSP], and [https://developer.mozilla.org/en-US/docs/Web/HTTP/Cross-Origin_Resource_Policy CORP] impact the problems identified in this paper?&lt;br /&gt;
* How does the rise of large platforms impact content-provider conflict?&lt;br /&gt;
* Did this paper change how you thought about the web?&lt;br /&gt;
&lt;br /&gt;
==Class Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 12&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
Plan for the rest of the semester is to read (some) my old papers&lt;br /&gt;
 - lots to think about trust&lt;br /&gt;
&lt;br /&gt;
Remember that you can and should critique these papers!&lt;br /&gt;
&lt;br /&gt;
G1&lt;br /&gt;
 - confining JS goes against economic model of the web, maybe?&lt;br /&gt;
 - discussed what happened with Honey&lt;br /&gt;
 - rethinking the web as a &amp;quot;wild west&amp;quot;&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - new tech defends against injection&lt;br /&gt;
 - increasing demands for ads, so increasing need for security&lt;br /&gt;
   - large platforms must enforce this security&lt;br /&gt;
 - browser extensions, particularly ad block, why do we trust them more than the ad itself?&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - new tech prevents injection but not content-provider conflict, issues is JS environment&lt;br /&gt;
 - large providers increase risks of conflict&lt;br /&gt;
 - increased awareness of security issues with ads&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - what do we do when legit businesses go bad?&lt;br /&gt;
 - centralization out-competed regular malware, you&#039;re already being spied on!&lt;br /&gt;
 - can&#039;t stop people being taken advantage of through tech&lt;br /&gt;
 - risk/reward impacts willingness for bad actors to be bad&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Terri later did ViSP, SOMA, and SSS (security style sheets)&lt;br /&gt;
&lt;br /&gt;
The real security issue in content-provider conflict is the DOM, not JS per se.&lt;br /&gt;
&lt;br /&gt;
The security solutions that get implemented on the web are the ones that serve the major platforms&lt;br /&gt;
 - not regular users&lt;br /&gt;
&lt;br /&gt;
page-level isolation mechanisms inhibit ad monitoring and ad security&lt;br /&gt;
 - avoiding click fraud&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25018</id>
		<title>EvoSec 2025W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25018"/>
		<updated>2025-02-25T15:29:57Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Discussion Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
While these are questions to consider, &#039;&#039;&#039;please focus your discussion on what your group finds interesting related to the paper&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* How do modern security technologies like [https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS CORS], [https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP CSP], and [https://developer.mozilla.org/en-US/docs/Web/HTTP/Cross-Origin_Resource_Policy CORP] impact the problems identified in this paper?&lt;br /&gt;
* How does the rise of large platforms impact content-provider conflict?&lt;br /&gt;
* Did this paper change how you thought about the web?&lt;br /&gt;
&lt;br /&gt;
==Class Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25017</id>
		<title>EvoSec 2025W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_12&amp;diff=25017"/>
		<updated>2025-02-25T15:29:43Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Readings==  * [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]  ==Discussion Questions==  While these are questions to consider, please focus your discussion on what your group finds interesting related to the paper.  * How do modern security technologies like [https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS CORS], [https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP CSP], and [htt...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
While these are questions to consider, please focus your discussion on what your group finds interesting related to the paper.&lt;br /&gt;
&lt;br /&gt;
* How do modern security technologies like [https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS CORS], [https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP CSP], and [https://developer.mozilla.org/en-US/docs/Web/HTTP/Cross-Origin_Resource_Policy CORP] impact the problems identified in this paper?&lt;br /&gt;
* How does the rise of large platforms impact content-provider conflict?&lt;br /&gt;
* Did this paper change how you thought about the web?&lt;br /&gt;
&lt;br /&gt;
==Class Notes==&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25016</id>
		<title>EvoSec 2025W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25016"/>
		<updated>2025-02-25T15:20:27Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Discussion Questions==&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 11&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
For Thursday&lt;br /&gt;
 - I&#039;ll set up an assignment for submitting PDFs for slides&lt;br /&gt;
   (1-3 slides at most), this is optional&lt;br /&gt;
 - whatever you present is not binding, you can change it!&lt;br /&gt;
 - this is a participation grade, so it is a grade for effort&lt;br /&gt;
&lt;br /&gt;
Questions&lt;br /&gt;
 - where is tech like that described in today&#039;s papers being used?&lt;br /&gt;
   - how close is it?&lt;br /&gt;
 - how about, trying to detect attackers when we don&#039;t know exactly how they will attack&lt;br /&gt;
   - so, catching novel attacks as well as regular ones&lt;br /&gt;
&lt;br /&gt;
Candidates&lt;br /&gt;
 - anomaly-based network monitoring&lt;br /&gt;
   - not common&lt;br /&gt;
 - spam detection&lt;br /&gt;
   - but you have examples of spam and ham (regular msgs)&lt;br /&gt;
   - and still doesn&#039;t work great against novel spam&lt;br /&gt;
 - ML applied to malware detection&lt;br /&gt;
   - but that isn&#039;t real time and is mostly focused on classifying samples&lt;br /&gt;
&lt;br /&gt;
There isn&#039;t much!&lt;br /&gt;
&lt;br /&gt;
Note that this work is not obscure&lt;br /&gt;
 - the &amp;quot;evolution of system call monitoring&amp;quot; was an invited paper&lt;br /&gt;
 - sense of self received a &amp;quot;test of time&amp;quot; award at IEEE SSP&lt;br /&gt;
&lt;br /&gt;
All of you: WHY?&lt;br /&gt;
&lt;br /&gt;
 - too many false positives&lt;br /&gt;
 - takes too long to create &amp;quot;normal&amp;quot; databases?&lt;br /&gt;
 - mimicry attacks are too easy?&lt;br /&gt;
 - normal can change&lt;br /&gt;
 - cost&lt;br /&gt;
 - graduated responses are not useful in fast computers&lt;br /&gt;
 - logistical difficulty in replacing current systems&lt;br /&gt;
 - lacks scalability&lt;br /&gt;
 - not enough work done to make it commercially viable&lt;br /&gt;
 - not adaptable/robust enough to justify changes&lt;br /&gt;
 - industry cannot sell it&lt;br /&gt;
 - too many false positives, waste of employee time&lt;br /&gt;
 - lacks adaptability, unable to adapt to changes over time&lt;br /&gt;
 - frequency of re-training or learning&lt;br /&gt;
 - experimental environment is complex, situation different for different OSs&lt;br /&gt;
 - local, system specific means it cannot scale/extend to other systems&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
None of the above is true&lt;br /&gt;
 - the basic tech works, and plenty of scope for improvement!&lt;br /&gt;
&lt;br /&gt;
But what did the evolution paper say?&lt;br /&gt;
 - different methods for monitoring system calls&lt;br /&gt;
   - but they are all much slower, and almost no gain in accuracy&lt;br /&gt;
 - applied to other systems&lt;br /&gt;
   - but barely followed up on&lt;br /&gt;
 - bit of work on use in real time, automated response&lt;br /&gt;
   - but that&#039;s basically my work&lt;br /&gt;
&lt;br /&gt;
HUGE amounts of follow-up work, almost no progress&lt;br /&gt;
&lt;br /&gt;
Do you disagree?&lt;br /&gt;
&lt;br /&gt;
I changed much of my focus to theory because I couldn&#039;t understand what was happening&lt;br /&gt;
&lt;br /&gt;
What would you like to learn more about?&lt;br /&gt;
&lt;br /&gt;
 - other systems I&#039;ve built&lt;br /&gt;
 - limitations of past systems I&#039;ve built&lt;br /&gt;
 - more alife, evolutionary systems&lt;br /&gt;
 - game theory in security&lt;br /&gt;
 - anomaly detection evasion techniques (mimicry attacks)&lt;br /&gt;
 - how to apply these ideas to crytography?&lt;br /&gt;
 - more bio-inspired systems&lt;br /&gt;
 - practical implementations of adaptive security, why aren&#039;t we doing this?&lt;br /&gt;
 - system call monitoring using arguments&lt;br /&gt;
 - defense mechanisms to address evolving threats&lt;br /&gt;
 - human interactions with autonomous security systems&lt;br /&gt;
 - programming language vuln detection&lt;br /&gt;
 - specific attack mechanisms to be addressed&lt;br /&gt;
 - new immune system security research&lt;br /&gt;
 - evolution of cloud security systems - diversity, selection?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25015</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25015"/>
		<updated>2025-02-25T15:20:03Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 11, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25014</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25014"/>
		<updated>2025-02-23T03:51:40Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* March 27, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, &amp;quot;After the BlockCloud Apocalypse.&amp;quot; (NSPW 2018)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25013</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25013"/>
		<updated>2025-02-23T03:37:31Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* March 4, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, &amp;quot;Towards Narrative Authentication: or, against boring authentication.&amp;quot; (NSPW 2013)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Early Literature Review due&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25012</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25012"/>
		<updated>2025-02-23T03:26:11Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* March 4, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Early Literature Review due&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25011</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25011"/>
		<updated>2025-02-23T03:14:14Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
===February 13, 2025===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, &amp;quot;Content Provider Conflict on the Modern Web.&amp;quot; (ASIA 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, &amp;quot;Evaluating Security Products with Clinical Trials.&amp;quot; (CSET 2009)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 1&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 2&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Presentations, Day 3&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Fundamentals_of_Web_Applications_(Fall_2024)&amp;diff=25009</id>
		<title>Fundamentals of Web Applications (Fall 2024)</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Fundamentals_of_Web_Applications_(Fall_2024)&amp;diff=25009"/>
		<updated>2025-02-17T20:01:35Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Lectures and Exams */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[Fundamentals of Web Applications: Fall 2024 Course Outline|Here]] is the course outline.&lt;br /&gt;
&lt;br /&gt;
==Lectures and Exams==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;width: 100%;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Date&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Topic&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 5&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 1|Lecture 1]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 10&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 2|Lecture 2]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 12&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 3|Lecture 3]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 17 (async)&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 4|Lecture 4]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 24&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 5|Lecture 5]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 26&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 6|Lecture 6]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 1&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 7|Lecture 7]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 3&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 8|Lecture 8]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 8&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 9|Lecture 9]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 10&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 10|Lecture 10]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 15&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 11|Lecture 11]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 17&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 12|Lecture 12]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 24, 11:35-12:55&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Midterm QA|Midterm Q &amp;amp; A (opt.)]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 29&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Midterm Exam (in class, online) [https://homeostasis.scs.carleton.ca/~soma/webfund-2024f/solutions/comp2406-midterm-2024f-sol.pdf (solutions)]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 31&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 13|Lecture 13]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 5&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 14|Lecture 14]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 7&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 15|Lecture 15]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 12&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 16|Lecture 16]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 14&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 17|Lecture 17]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 19&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 18|Lecture 18]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 21&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 19|Lecture 19]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 26&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 20|Lecture 20]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 28&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 21|Lecture 21]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Dec. 3&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 22|Lecture 22]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Dec. 5&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Lecture 23|Lecture 23]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Dec 10, 11:35-12:55&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F Final Exam QA|Final Exam Q &amp;amp; A (opt.)]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Dec. 12, 9 AM&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Final Exam [https://homeostasis.scs.carleton.ca/~soma/webfund-2024f/solutions/comp2406-final-2024f-sol.pdf (solutions)]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tutorials==&lt;br /&gt;
&lt;br /&gt;
For each tutorial you will get a progress grade from 0-4, given to you by a TA.  If you are being diligent, you should be able to get 4&#039;s every week.  The easiest way to get your grade is to come to tutorial and meet with your TA; alternately, you can meet a TA in their office hours. You may discuss with your TA in person or online, but the conversation should at least involve a voice call.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;width: 100%;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Release Date&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Show By&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Tutorials&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 12&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&amp;lt;del&amp;gt;Oct. 7&amp;lt;/del&amp;gt; &#039;&#039;&#039;Oct. 9&#039;&#039;&#039;&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 1|Asynchronous Code in JavaScript]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 19&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&amp;lt;del&amp;gt;Oct. 7&amp;lt;/del&amp;gt; &#039;&#039;&#039;Oct. 9&#039;&#039;&#039;&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 2|Simple web server]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Sept. 26&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Oct. 17&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 3|Form Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 3&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Oct. 17&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 4|Database Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 10&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Nov. 13&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 5|DOM Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 31&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Nov. 13&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 6|Tutorial Validator]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 7&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Nov. 15&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 7|Submission Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 14&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Nov. 29&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 8|Authentication Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 22&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;Dec. 6&amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Tutorial 9|Fresh Demo]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&amp;lt;table style=&amp;quot;width: 100%;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Due Date&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
    &amp;lt;p align=&amp;quot;left&amp;quot;&amp;gt;Assignments&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;&amp;lt;del&amp;gt;Oct. 7&amp;lt;/del&amp;gt; &#039;&#039;&#039;Oct. 9&#039;&#039;&#039;&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Assignment 1|Assignment 1]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Oct. 16&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Assignment 2|Assignment 2]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Nov. 20&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Assignment 3|Assignment 3]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;Dec. 4&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
      &amp;lt;td&amp;gt;&lt;br /&gt;
      &amp;lt;p&amp;gt;[[WebFund 2024F: Assignment 4|Assignment 4]]&lt;br /&gt;
      &amp;lt;/p&amp;gt;&lt;br /&gt;
      &amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
===JavaScript===&lt;br /&gt;
&lt;br /&gt;
* A good book is [http://eloquentjavascript.net/ Eloquent JavaScript: A Modern Introduction to Programming] by Marijn Haverbeke.  A version of this book is available online for free, but you can also purchase a copy.&lt;br /&gt;
* A more in-depth book series is [https://github.com/getify/You-Dont-Know-JS?tab=readme-ov-file You Don&#039;t Know JS Yet].&lt;br /&gt;
* A standard reference for JavaScript is [http://shop.oreilly.com/product/9780596805531.do JavaScript: The Definitive Guide] by David Flanagan.  It is a big book, but it is comprehensive. (You&#039;ll probably have to buy this one.)&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25008</id>
		<title>EvoSec 2025W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25008"/>
		<updated>2025-02-12T17:20:05Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 11&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
For Thursday&lt;br /&gt;
 - I&#039;ll set up an assignment for submitting PDFs for slides&lt;br /&gt;
   (1-3 slides at most), this is optional&lt;br /&gt;
 - whatever you present is not binding, you can change it!&lt;br /&gt;
 - this is a participation grade, so it is a grade for effort&lt;br /&gt;
&lt;br /&gt;
Questions&lt;br /&gt;
 - where is tech like that described in today&#039;s papers being used?&lt;br /&gt;
   - how close is it?&lt;br /&gt;
 - how about, trying to detect attackers when we don&#039;t know exactly how they will attack&lt;br /&gt;
   - so, catching novel attacks as well as regular ones&lt;br /&gt;
&lt;br /&gt;
Candidates&lt;br /&gt;
 - anomaly-based network monitoring&lt;br /&gt;
   - not common&lt;br /&gt;
 - spam detection&lt;br /&gt;
   - but you have examples of spam and ham (regular msgs)&lt;br /&gt;
   - and still doesn&#039;t work great against novel spam&lt;br /&gt;
 - ML applied to malware detection&lt;br /&gt;
   - but that isn&#039;t real time and is mostly focused on classifying samples&lt;br /&gt;
&lt;br /&gt;
There isn&#039;t much!&lt;br /&gt;
&lt;br /&gt;
Note that this work is not obscure&lt;br /&gt;
 - the &amp;quot;evolution of system call monitoring&amp;quot; was an invited paper&lt;br /&gt;
 - sense of self received a &amp;quot;test of time&amp;quot; award at IEEE SSP&lt;br /&gt;
&lt;br /&gt;
All of you: WHY?&lt;br /&gt;
&lt;br /&gt;
 - too many false positives&lt;br /&gt;
 - takes too long to create &amp;quot;normal&amp;quot; databases?&lt;br /&gt;
 - mimicry attacks are too easy?&lt;br /&gt;
 - normal can change&lt;br /&gt;
 - cost&lt;br /&gt;
 - graduated responses are not useful in fast computers&lt;br /&gt;
 - logistical difficulty in replacing current systems&lt;br /&gt;
 - lacks scalability&lt;br /&gt;
 - not enough work done to make it commercially viable&lt;br /&gt;
 - not adaptable/robust enough to justify changes&lt;br /&gt;
 - industry cannot sell it&lt;br /&gt;
 - too many false positives, waste of employee time&lt;br /&gt;
 - lacks adaptability, unable to adapt to changes over time&lt;br /&gt;
 - frequency of re-training or learning&lt;br /&gt;
 - experimental environment is complex, situation different for different OSs&lt;br /&gt;
 - local, system specific means it cannot scale/extend to other systems&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
None of the above is true&lt;br /&gt;
 - the basic tech works, and plenty of scope for improvement!&lt;br /&gt;
&lt;br /&gt;
But what did the evolution paper say?&lt;br /&gt;
 - different methods for monitoring system calls&lt;br /&gt;
   - but they are all much slower, and almost no gain in accuracy&lt;br /&gt;
 - applied to other systems&lt;br /&gt;
   - but barely followed up on&lt;br /&gt;
 - bit of work on use in real time, automated response&lt;br /&gt;
   - but that&#039;s basically my work&lt;br /&gt;
&lt;br /&gt;
HUGE amounts of follow-up work, almost no progress&lt;br /&gt;
&lt;br /&gt;
Do you disagree?&lt;br /&gt;
&lt;br /&gt;
I changed much of my focus to theory because I couldn&#039;t understand what was happening&lt;br /&gt;
&lt;br /&gt;
What would you like to learn more about?&lt;br /&gt;
&lt;br /&gt;
 - other systems I&#039;ve built&lt;br /&gt;
 - limitations of past systems I&#039;ve built&lt;br /&gt;
 - more alife, evolutionary systems&lt;br /&gt;
 - game theory in security&lt;br /&gt;
 - anomaly detection evasion techniques (mimicry attacks)&lt;br /&gt;
 - how to apply these ideas to crytography?&lt;br /&gt;
 - more bio-inspired systems&lt;br /&gt;
 - practical implementations of adaptive security, why aren&#039;t we doing this?&lt;br /&gt;
 - system call monitoring using arguments&lt;br /&gt;
 - defense mechanisms to address evolving threats&lt;br /&gt;
 - human interactions with autonomous security systems&lt;br /&gt;
 - programming language vuln detection&lt;br /&gt;
 - specific attack mechanisms to be addressed&lt;br /&gt;
 - new immune system security research&lt;br /&gt;
 - evolution of cloud security systems - diversity, selection?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25007</id>
		<title>EvoSec 2025W Lecture 10</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25007"/>
		<updated>2025-02-06T18:00:40Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Discussion Questions==&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 10&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
 - areas of interest are all graded&lt;br /&gt;
 - please read feedback and follow up as necessary&lt;br /&gt;
    - message on Teams, we can have a call if necessary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is the basic approach to diversity taken by the Forrest paper?&lt;br /&gt;
 - the program source code is a &amp;quot;spec&amp;quot; &amp;lt;-- how it SHOULD behave&lt;br /&gt;
 - vary how it is translated into an executing program&lt;br /&gt;
   (as source doesn&#039;t specify this precisely)&lt;br /&gt;
&lt;br /&gt;
 - memory layout, instruction set, function/system call names and more could vary&lt;br /&gt;
&lt;br /&gt;
So with this approach, what is not diverse?&lt;br /&gt;
 - the source code!&lt;br /&gt;
&lt;br /&gt;
If the source code is always the same, what kinds of security vulnerabilities CANNOT be addressed with Forrest&#039;s approach?&lt;br /&gt;
 - algorithmic weaknesses (e.g. cryptography)&lt;br /&gt;
 - higher-level code injection attacks will still work (e.g., SQL injection)&lt;br /&gt;
 - authentication bypass because of insufficient checks&lt;br /&gt;
&lt;br /&gt;
In fact, most security vulnerabilites won&#039;t be impacted by changing how the code is translated&lt;br /&gt;
&lt;br /&gt;
It can really only stop attacks based on machine code injection &amp;amp; timing attacks (MAYBE)&lt;br /&gt;
&lt;br /&gt;
What is the difference between diversity and randomization?&lt;br /&gt;
&lt;br /&gt;
randomization&lt;br /&gt;
 - uniform selection from a set of possibilities&lt;br /&gt;
 - always has to be limited as random programs don&#039;t do anything&lt;br /&gt;
 - in practice, can only randomize what isn&#039;t functionaly important&lt;br /&gt;
&lt;br /&gt;
diversity is always about functional diversity&lt;br /&gt;
 - variations that make the system behave differently&lt;br /&gt;
   - but can &amp;quot;fit&amp;quot; into its role&lt;br /&gt;
&lt;br /&gt;
diversity is always relative, never absolute&lt;br /&gt;
&lt;br /&gt;
To understand diversity, we have to understand the problem it addresses&lt;br /&gt;
&lt;br /&gt;
What is an attack search space?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25006</id>
		<title>EvoSec 2025W Lecture 10</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25006"/>
		<updated>2025-02-06T18:00:01Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Discussion Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 10&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
 - areas of interest are all graded&lt;br /&gt;
 - please read feedback and follow up as necessary&lt;br /&gt;
    - message on Teams, we can have a call if necessary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is the basic approach to diversity taken by the Forrest paper?&lt;br /&gt;
 - the program source code is a &amp;quot;spec&amp;quot; &amp;lt;-- how it SHOULD behave&lt;br /&gt;
 - vary how it is translated into an executing program&lt;br /&gt;
   (as source doesn&#039;t specify this precisely)&lt;br /&gt;
&lt;br /&gt;
 - memory layout, instruction set, function/system call names and more could vary&lt;br /&gt;
&lt;br /&gt;
So with this approach, what is not diverse?&lt;br /&gt;
 - the source code!&lt;br /&gt;
&lt;br /&gt;
If the source code is always the same, what kinds of security vulnerabilities CANNOT be addressed with Forrest&#039;s approach?&lt;br /&gt;
 - algorithmic weaknesses (e.g. cryptography)&lt;br /&gt;
 - higher-level code injection attacks will still work (e.g., SQL injection)&lt;br /&gt;
 - authentication bypass because of insufficient checks&lt;br /&gt;
&lt;br /&gt;
In fact, most security vulnerabilites won&#039;t be impacted by changing how the code is translated&lt;br /&gt;
&lt;br /&gt;
It can really only stop attacks based on machine code injection &amp;amp; timing attacks (MAYBE)&lt;br /&gt;
&lt;br /&gt;
What is the difference between diversity and randomization?&lt;br /&gt;
&lt;br /&gt;
randomization&lt;br /&gt;
 - uniform selection from a set of possibilities&lt;br /&gt;
 - always has to be limited as random programs don&#039;t do anything&lt;br /&gt;
 - in practice, can only randomize what isn&#039;t functionaly important&lt;br /&gt;
&lt;br /&gt;
diversity is always about functional diversity&lt;br /&gt;
 - variations that make the system behave differently&lt;br /&gt;
   - but can &amp;quot;fit&amp;quot; into its role&lt;br /&gt;
&lt;br /&gt;
diversity is always relative, never absolute&lt;br /&gt;
&lt;br /&gt;
To understand diversity, we have to understand the problem it addresses&lt;br /&gt;
&lt;br /&gt;
What is an attack search space?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_9&amp;diff=25005</id>
		<title>EvoSec 2025W Lecture 9</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_9&amp;diff=25005"/>
		<updated>2025-02-06T17:58:56Z</updated>

		<summary type="html">&lt;p&gt;Soma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Discussion Questions==&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 9&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
What is entropy? (G1)&lt;br /&gt;
 - least diverse -&amp;gt; least entropy&lt;br /&gt;
&lt;br /&gt;
So maybe increasing entropy (disorder) would increase security?&lt;br /&gt;
 - multiple kinds of software, hosts, etc&lt;br /&gt;
&lt;br /&gt;
But that seems chaotic and thus insecure?&lt;br /&gt;
&lt;br /&gt;
Entropy on a specific graph&lt;br /&gt;
 - hosts can have some number of vulns&lt;br /&gt;
 - edges represent the vulns a host has&lt;br /&gt;
 - cannot remove all edges by assumption - hosts always have some&lt;br /&gt;
 - increase entropy -&amp;gt; more disorder in edges&lt;br /&gt;
&lt;br /&gt;
Adding new kinds of systems =&amp;gt; increase the space of vulnerabilities&lt;br /&gt;
 - attack surface goes up!&lt;br /&gt;
&lt;br /&gt;
If diversity is the answer, what is the question?&lt;br /&gt;
 - consider for Thursday&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25004</id>
		<title>EvoSec 2025W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25004"/>
		<updated>2025-02-06T17:58:36Z</updated>

		<summary type="html">&lt;p&gt;Soma: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25003</id>
		<title>EvoSec 2025W Lecture 11</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_11&amp;diff=25003"/>
		<updated>2025-02-06T17:58:14Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;&amp;lt;pre&amp;gt; Lecture 9 ---------  What is entropy? (G1)  - least diverse -&amp;gt; least entropy  So maybe increasing entropy (disorder) would increase security?  - multiple kinds of software, hosts, etc  But that seems chaotic and thus insecure?  Entropy on a specific graph  - hosts can have some number of vulns  - edges represent the vulns a host has  - cannot remove all edges by assumption - hosts always have some  - increase entropy -&amp;gt; more disorder in edges  Adding new kinds of s...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 9&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
What is entropy? (G1)&lt;br /&gt;
 - least diverse -&amp;gt; least entropy&lt;br /&gt;
&lt;br /&gt;
So maybe increasing entropy (disorder) would increase security?&lt;br /&gt;
 - multiple kinds of software, hosts, etc&lt;br /&gt;
&lt;br /&gt;
But that seems chaotic and thus insecure?&lt;br /&gt;
&lt;br /&gt;
Entropy on a specific graph&lt;br /&gt;
 - hosts can have some number of vulns&lt;br /&gt;
 - edges represent the vulns a host has&lt;br /&gt;
 - cannot remove all edges by assumption - hosts always have some&lt;br /&gt;
 - increase entropy -&amp;gt; more disorder in edges&lt;br /&gt;
&lt;br /&gt;
Adding new kinds of systems =&amp;gt; increase the space of vulnerabilities&lt;br /&gt;
 - attack surface goes up!&lt;br /&gt;
&lt;br /&gt;
If diversity is the answer, what is the question?&lt;br /&gt;
 - consider for Thursday&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25002</id>
		<title>EvoSec 2025W Lecture 10</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_10&amp;diff=25002"/>
		<updated>2025-02-04T16:36:22Z</updated>

		<summary type="html">&lt;p&gt;Soma: Created page with &amp;quot;==Discussion Questions==  * What is the basic model behind both of these systems? Hint: focus on the figures! * What aspect(s) of security are these models capturing? What are they missing?  Today you&amp;#039;ll be teaching the class, i.e., I&amp;#039;ll be asking questions as if I don&amp;#039;t understand things.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
Today you&#039;ll be teaching the class, i.e., I&#039;ll be asking questions as if I don&#039;t understand things.&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25001</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25001"/>
		<updated>2025-01-31T03:29:11Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 11, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is &amp;quot;sequence-based system call monitoring&amp;quot;?&lt;br /&gt;
* How did system-call monitoring &amp;quot;evolve&amp;quot;? Specifically, to what extent did its &amp;quot;fitness&amp;quot; improve?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25000</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=25000"/>
		<updated>2025-01-31T03:26:39Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 11, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, &amp;quot;A Sense of Self for Unix Processes.&amp;quot; (IEEE SP 1996)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, &amp;quot;The Evolution of System-call Monitoring.&amp;quot; (ACSAC 2008)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24999</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24999"/>
		<updated>2025-01-31T03:11:02Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* Class Schedule (Readings &amp;amp; Notes) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 12|February 13, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Project elevator pitches (presentations in class)&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24998</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24998"/>
		<updated>2025-01-31T01:38:06Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 6, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24997</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24997"/>
		<updated>2025-01-31T01:37:57Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 4, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Discussion Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24996</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24996"/>
		<updated>2025-01-31T01:37:37Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 6, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
====Questions====&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24995</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24995"/>
		<updated>2025-01-31T01:37:15Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 4, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
====Readings====&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
====Questions====&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Questions:&#039;&#039;&#039;&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24994</id>
		<title>Evolutionary Security: Winter 2025</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Evolutionary_Security:_Winter_2025&amp;diff=24994"/>
		<updated>2025-01-31T01:36:51Z</updated>

		<summary type="html">&lt;p&gt;Soma: /* February 6, 2025 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Course Outline==&lt;br /&gt;
&lt;br /&gt;
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].&lt;br /&gt;
&lt;br /&gt;
==Literature Review==&lt;br /&gt;
&lt;br /&gt;
To help you write a literature review or the background of a research paper, read the following:&lt;br /&gt;
* Harvey, &amp;quot;What Is a Literature Review?&amp;quot; [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]&lt;br /&gt;
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, &amp;quot;The Literature Review: A Few Tips On Conducting It&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
==Class Schedule (Readings &amp;amp; Notes)==&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Introduction to Trust&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Computational Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, &amp;quot;Formalising Trust as a Computational Concept.&amp;quot;] (Chapters 1 &amp;amp; 3)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Biological Trust&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, &amp;quot;The Biological Evolution of Cooperation and Trust.&amp;quot;] (1988)&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod &amp;amp; Roze, &amp;quot;Cooperation and conflict in the evolution of multicellularity.&amp;quot;] (2001)&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===&lt;br /&gt;
&lt;br /&gt;
OceanStore &amp;amp; BOINC&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., &amp;quot;OceanStore: An Architecture for Global-Scale Persistent Storage&amp;quot; (SIGPLAN 2000)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., &amp;quot;Pond: the OceanStore Prototype&amp;quot; (FAST 2003)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, &amp;quot;BOINC: A System for Public-Resource Computing and Storage&amp;quot; (Grid Computing 2004)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Chubby &amp;amp; GFS&lt;br /&gt;
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]&lt;br /&gt;
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., &amp;quot;The Google File System&amp;quot; (SOSP 2003)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Symbiosis&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===&lt;br /&gt;
&lt;br /&gt;
Tierra&lt;br /&gt;
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, &amp;quot;Software diversity: Security, Entropy, and Game Theory.&amp;quot; (HotSec 2012)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, &amp;quot;A Fragility Metric for Software Diversity.&amp;quot; (ASIA 2024)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Questions:&#039;&#039;&#039;&lt;br /&gt;
* What is the basic model behind both of these systems? Hint: focus on the figures!&lt;br /&gt;
* What aspect(s) of security are these models capturing? What are they missing?&lt;br /&gt;
&lt;br /&gt;
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===&lt;br /&gt;
&lt;br /&gt;
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, &amp;quot;Building Diverse Computer Systems.&amp;quot; (HotOS 1997)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, &amp;quot;Towards Foundational Security Metrics.&amp;quot; (NSPW 2024)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Questions:&#039;&#039;&#039;&lt;br /&gt;
* What security problems does the Forrest paper address? What problems does it not address?&lt;br /&gt;
* How plausible/realistic is the model in Mansourzadeh&#039;s paper?&lt;br /&gt;
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh&#039;s paper?&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
</feed>