<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=EvoSec_2025W_Lecture_18</id>
	<title>EvoSec 2025W Lecture 18 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=EvoSec_2025W_Lecture_18"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_18&amp;action=history"/>
	<updated>2026-04-22T09:00:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_18&amp;diff=25042&amp;oldid=prev</id>
		<title>Soma: Created page with &quot;==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &quot;Towards In-Band Non-Cryptographic Authentication.&quot; (NSPW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &quot;Object-Level Recombination of Commodity Applications.&quot; (GECCO 2010)]  ==Notes== &lt;pre&gt; Lecture 18 ---------- G1  - can be more complex to detect imposters in practice because to do so because 1) you won&#039;t consider it a possibility, and...&quot;</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=EvoSec_2025W_Lecture_18&amp;diff=25042&amp;oldid=prev"/>
		<updated>2025-03-18T18:36:34Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]  ==Notes== &amp;lt;pre&amp;gt; Lecture 18 ---------- G1  - can be more complex to detect imposters in practice because to do so because 1) you won&amp;#039;t consider it a possibility, and...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Readings==&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, &amp;quot;Towards In-Band Non-Cryptographic Authentication.&amp;quot; (NSPW 2020)]&lt;br /&gt;
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, &amp;quot;Object-Level Recombination of Commodity Applications.&amp;quot; (GECCO 2010)]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Lecture 18&lt;br /&gt;
----------&lt;br /&gt;
G1&lt;br /&gt;
 - can be more complex to detect imposters in practice because to do so because 1) you won&amp;#039;t consider it a possibility, and 2) you&amp;#039;d have to act weird&lt;br /&gt;
 - AI chatbots can immitate people given chat history, that could defeat detection attempts&lt;br /&gt;
 - shared history may be the strongest authenticator but isn&amp;#039;t practical (like narrative auth)&lt;br /&gt;
&lt;br /&gt;
G2&lt;br /&gt;
 - What&amp;#039;s the connection between these two? Seemed obscure&lt;br /&gt;
   - create new and identifiable contexts for security&lt;br /&gt;
     - security context from code diversity vs shared knowledge/observations&lt;br /&gt;
 - computer-to-computer is not like people-to-people communication, is it even feasible to distinguish them?&lt;br /&gt;
 - similar to encryption, shared secret, but secret is shared context&lt;br /&gt;
 - how complex of models would be required for authentication between computers?&lt;br /&gt;
&lt;br /&gt;
G4&lt;br /&gt;
 - doesn&amp;#039;t computer behavior boil down to protocols, so not so much opportunity for unknown shared context?&lt;br /&gt;
   - if one host is compromised, it can be immitated using stolen data&lt;br /&gt;
   - compromised communication allows models to be built up over time&lt;br /&gt;
 - how does the link resolver work?!&lt;br /&gt;
 - is genetic recombination practical?&lt;br /&gt;
   - can you really get more complexity over many generations?&lt;br /&gt;
 - what is the similarity between the papers?&lt;br /&gt;
&lt;br /&gt;
G3&lt;br /&gt;
 - knowing the attacker could be there biases the conversation&lt;br /&gt;
   - if you did a more &amp;quot;real world&amp;quot; experiment, would people detect impersonation if not primed? suspect they won&amp;#039;t&lt;br /&gt;
   - in the real world users, if someone knows they&amp;#039;ve been hacked they have other ways of communicating this fact&lt;br /&gt;
 - if defender can train model, attacker can also, and your behavior is harder to change than a password&lt;br /&gt;
 - no mutation of object files, so is this evolution?&lt;br /&gt;
   - how can we do mutation here that would generate novelty?&lt;br /&gt;
   - don&amp;#039;t we still need people? How can this be fully automated?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I don&amp;#039;t see these papers as practical, but evocative&lt;br /&gt;
 - how do people recognize each other when limited to text?&lt;br /&gt;
 - can we have programs sexually reproduce like biological organisms, without&lt;br /&gt;
   being designed for this?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
don&amp;#039;t mistake the abstraction for the implementation&lt;br /&gt;
 - computer-to-computer &amp;quot;conversational&amp;quot; auth would have models of implementation &amp;amp; context-specific details&lt;br /&gt;
   - precise program versions&lt;br /&gt;
   - communication details&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Soma</name></author>
	</entry>
</feed>