<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=EvoSec_2025W_Lecture_1</id>
	<title>EvoSec 2025W Lecture 1 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=EvoSec_2025W_Lecture_1"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_1&amp;action=history"/>
	<updated>2026-04-22T09:00:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_1&amp;diff=24950&amp;oldid=prev</id>
		<title>Soma: Created page with &quot;&lt;pre&gt; Lecture 1 ---------  Welcome to Evolutionary Security!   - lectures are recorded, but that is just for private use  - you&#039;ll have access, but they won&#039;t be public   * Grading, expectations * What this course is about  * My history  - 1984: first computers (Atari 400, Apple //c, Apple IIgs)  - 1989: AI  - Medicine + computers?   - 1990-1994: MIT    - started as biology major, ended up a math major    - took premed classes + CS classes (CS theory)    - computational...&quot;</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_1&amp;diff=24950&amp;oldid=prev"/>
		<updated>2025-01-09T22:02:09Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; Lecture 1 ---------  Welcome to Evolutionary Security!   - lectures are recorded, but that is just for private use  - you&amp;#039;ll have access, but they won&amp;#039;t be public   * Grading, expectations * What this course is about  * My history  - 1984: first computers (Atari 400, Apple //c, Apple IIgs)  - 1989: AI  - Medicine + computers?   - 1990-1994: MIT    - started as biology major, ended up a math major    - took premed classes + CS classes (CS theory)    - computational...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 1&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
Welcome to Evolutionary Security!&lt;br /&gt;
&lt;br /&gt;
 - lectures are recorded, but that is just for private use&lt;br /&gt;
 - you&amp;#039;ll have access, but they won&amp;#039;t be public&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Grading, expectations&lt;br /&gt;
* What this course is about&lt;br /&gt;
&lt;br /&gt;
* My history&lt;br /&gt;
 - 1984: first computers (Atari 400, Apple //c, Apple IIgs)&lt;br /&gt;
 - 1989: AI&lt;br /&gt;
 - Medicine + computers?&lt;br /&gt;
&lt;br /&gt;
 - 1990-1994: MIT&lt;br /&gt;
   - started as biology major, ended up a math major&lt;br /&gt;
   - took premed classes + CS classes (CS theory)&lt;br /&gt;
   - computational biology?&lt;br /&gt;
   - artificial life&lt;br /&gt;
      - part of &amp;quot;complex adaptive systems&amp;quot;&lt;br /&gt;
 - University of New Mexico, Santa Fe Institue&lt;br /&gt;
   - theoretical immunology&lt;br /&gt;
   - computer immune system?&lt;br /&gt;
   - real-time intrusion detection &amp;amp; response system based&lt;br /&gt;
     on lightweight anomaly detection (pH)&lt;br /&gt;
 - joined Carleton in 2003&lt;br /&gt;
&lt;br /&gt;
Why don&amp;#039;t other security researchers like the things I like?&lt;br /&gt;
 - my aesthetics for computer defenses seem VERY different, why?&lt;br /&gt;
&lt;br /&gt;
Early work was focused on bio-inspired methods&lt;br /&gt;
 - WAY too easy to do name magic with biological terms&lt;br /&gt;
&lt;br /&gt;
Metaphors let you map domain A onto domain B&lt;br /&gt;
 - but what you really want is some common theory T that applies to A and B&lt;br /&gt;
&lt;br /&gt;
So this course is about that theory, trying to explain and elaborate it&lt;br /&gt;
 - but I don&amp;#039;t have a complete theory yet, I more have an outline&lt;br /&gt;
&lt;br /&gt;
I think Darwin messed up&lt;br /&gt;
 - current evolutionary theory isn&amp;#039;t wrong, but it misses the big picture&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What&amp;#039;s your job in this course?&lt;br /&gt;
 - provide feedback on what I say (question, argue against even)&lt;br /&gt;
 - develop your own ideas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Darwinian evolution&lt;br /&gt;
* Artificial life&lt;br /&gt;
* Limitations of current computer security theory &amp;amp; practice&lt;br /&gt;
* game theory in the context of evolution&lt;br /&gt;
* symbiogenesis&lt;br /&gt;
* current security arms race&lt;br /&gt;
  - evidence for evolutionary dynamics&lt;br /&gt;
* evolution in other domains&lt;br /&gt;
  - economics, social organization&lt;br /&gt;
  - practice of computer security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Limitation of computer security practice currently&lt;br /&gt;
&lt;br /&gt;
State of the art defenses&lt;br /&gt;
 - anti-malware&lt;br /&gt;
 - firewalls&lt;br /&gt;
 - automated software patches&lt;br /&gt;
 - automated vulnerability discovery&lt;br /&gt;
 - multi-factor authentication&lt;br /&gt;
 - access controls&lt;br /&gt;
 - immutable systems&lt;br /&gt;
 - virtualization/confinement&lt;br /&gt;
 - biometrics&lt;br /&gt;
 &lt;br /&gt;
If you implement all of the above, using &amp;quot;best practices&amp;quot;, money is no object...is your system secure?&lt;br /&gt;
&lt;br /&gt;
Specifically, could an attacker develop an attack that a) bypasses all of these defenses and b) would not be detected later if the attacker is competent (unless someone smart noticed something)&lt;br /&gt;
 - YES&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is not true for biology!&lt;br /&gt;
 - if things go wrong, your body notices and fights back&lt;br /&gt;
   - it doesn&amp;#039;t always succeed, but it basically always tries&lt;br /&gt;
&lt;br /&gt;
HOW? WHY?&lt;br /&gt;
 - and why can&amp;#039;t computers do this?!&lt;br /&gt;
&lt;br /&gt;
It isn&amp;#039;t about mechanisms, it is about architecture&lt;br /&gt;
&lt;br /&gt;
biological systems are robust under evolutionary pressure&lt;br /&gt;
 - because they had to be&lt;br /&gt;
 - computer systems aren&amp;#039;t&lt;br /&gt;
   - computer systems + people are&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Charles Darwin&lt;br /&gt;
 - wanted to explain the diversity of life&lt;br /&gt;
   - how organisms are similar yet different&lt;br /&gt;
   - maybe where they all came from&lt;br /&gt;
 - he knew about &amp;quot;artificial selection&amp;quot;, animal husbandry&lt;br /&gt;
 - maybe selection also happens in nature, but &amp;quot;natural selection&amp;quot;&lt;br /&gt;
   - &amp;quot;survival of the fittest&amp;quot;&lt;br /&gt;
 - so you have&lt;br /&gt;
   - a population of diverse individuals&lt;br /&gt;
     - heritable characteristics (not dependent on life experience)&lt;br /&gt;
   - some sort of selective pressure&lt;br /&gt;
     - survival + reproductive pressure&lt;br /&gt;
 - over time, this will result in a population of &amp;quot;improved fitness&amp;quot;&lt;br /&gt;
 - conclusion: this is where species came from&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ve created artificial simulations of the above, and it doesn&amp;#039;t produce anything like the diversity of life&lt;br /&gt;
&lt;br /&gt;
What&amp;#039;s missing is cooperation&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
</feed>