User contributions for Soma

A user with 6,615 edits. Account created on 16 September 2007.
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)

27 March 2025

  • 21:2321:23, 27 March 2025 diff hist +3,203 EvoSec 2025W Lecture 21No edit summary current
  • 15:2615:26, 27 March 2025 diff hist +428 N EvoSec 2025W Lecture 21Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, "After the BlockCloud Apocalypse." (NSPW 2018)] ==Discussion Questions== * Which predictions were the most plausible? implausible? * What relevant advancements/developments (technical or otherwise) were missed in the timeline that could change the envisioned trajectory? * What can we do to avoid a blockcloud apocalypse? ==Notes=="

25 March 2025

  • 18:5318:53, 25 March 2025 diff hist +3,944 EvoSec 2025W Lecture 20No edit summary current
  • 15:3015:30, 25 March 2025 diff hist +628 N EvoSec 2025W Lecture 20Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, "Principles of a Computer Immune System." (NSPW 1997)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)] ==Discussion Questions== * How does evolution relate to biologically-inspired security? * How does trust relate to biologically-inspired sec..."

20 March 2025

  • 17:4017:40, 20 March 2025 diff hist +2,371 EvoSec 2025W Lecture 19→‎Notes current
  • 15:3515:35, 20 March 2025 diff hist +534 N EvoSec 2025W Lecture 19Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, "bpfbox: Simple Precise Process Confinement with eBPF." (CCSW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, "Bpfcontain: Fixing the soft underbelly of container security." (arXiv 2021)] ==Discussion Questions== * Is the complexity of Linux security mechanisms due more to functional requirements or evolutionary processes? * What is..."

18 March 2025

  • 18:3618:36, 18 March 2025 diff hist +2,615 N EvoSec 2025W Lecture 18Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, "Towards In-Band Non-Cryptographic Authentication." (NSPW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, "Object-Level Recombination of Commodity Applications." (GECCO 2010)] ==Notes== <pre> Lecture 18 ---------- G1 - can be more complex to detect imposters in practice because to do so because 1) you won't consider it a possibility, and..." current

13 March 2025

11 March 2025

  • 18:2018:20, 11 March 2025 diff hist +3,169 EvoSec 2025W Lecture 16→‎Notes current
  • 15:3115:31, 11 March 2025 diff hist +995 N EvoSec 2025W Lecture 16Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, "Securing Email Archives through User Modeling." (ACSAC 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, "Fine-grained Access Control using Email Social Networks." (CATX 2013)] ==Discussion Questions== Feel free to only address a subset or none of the following questions in your discussion! * What does it take to define "normal"? In what contexts is it easi..."

6 March 2025

  • 19:2119:21, 6 March 2025 diff hist +2,413 EvoSec 2025W Lecture 15No edit summary current
  • 16:2316:23, 6 March 2025 diff hist +753 N EvoSec 2025W Lecture 15Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, "“Don’t Break My Heart!”: User Security Strategies for Online Dating." (USEC 2017)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, "Can I believe you?: Establishing Trust in Computer Mediated Introductions." (NSPW 2017)] ==Discussion Questions== * How different is dating from other introduction problems today? * How central is reputat..."

4 March 2025

  • 18:4818:48, 4 March 2025 diff hist +2,090 EvoSec 2025W Lecture 14→‎Notes current
  • 16:3216:32, 4 March 2025 diff hist +572 N EvoSec 2025W Lecture 14Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, "Towards Narrative Authentication: or, against boring authentication." (NSPW 2013)] ==Discussion Questions== * How quickly can you verify that another person knows the same story that you do? Can someone who doesn't know the story fool you easily? * Are there stories that are known to friends and family but that are not written down anywhere? * Could any social media or fina..."

1 March 2025

27 February 2025

  • 21:5621:56, 27 February 2025 diff hist +1,972 EvoSec 2025W Lecture 13→‎Notes current
  • 15:2815:28, 27 February 2025 diff hist +694 N EvoSec 2025W Lecture 13Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, "Evaluating Security Products with Clinical Trials." (CSET 2009)] ==Discussion Questions== * What is the relationship between trust in medical interventions and clinical trials versus lab experiments? * What is the relationship between trust in security interventions and lab experiments currently? * For a security trial to be valid, would the product being tested be allowed..."

25 February 2025

23 February 2025

17 February 2025

12 February 2025

6 February 2025

4 February 2025

  • 16:3616:36, 4 February 2025 diff hist +290 N EvoSec 2025W Lecture 10Created page with "==Discussion Questions== * What is the basic model behind both of these systems? Hint: focus on the figures! * What aspect(s) of security are these models capturing? What are they missing? Today you'll be teaching the class, i.e., I'll be asking questions as if I don't understand things."

31 January 2025

(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)