Adaptive Security (Fall 2020): Difference between revisions

From Soma-notes
Line 12: Line 12:


* A. K. Dewdney, [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/akdewdney/index.html Core Wars] (local copy)
* A. K. Dewdney, [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/akdewdney/index.html Core Wars] (local copy)
** https://www.jstor.org/stable/24967583  
** [https://www.jstor.org/stable/24967583 In the game called Core War hostile programs engage in a battle of bits.]  (Scientific American, )
** https://www.jstor.org/stable/24987184
** [https://www.jstor.org/stable/24969361 A Core War bestiary of viruses, worms and other threats to computer memories] (Sciencific American, )
** https://www.jstor.org/stable/24969361
** [https://www.jstor.org/stable/24979289 A program called MICE nibbles its way to victory at the first Core War tournament] (Scientific American, )
** https://www.jstor.org/stable/24979289
** [https://www.jstor.org/stable/24987184 Of worms, viruses and Core War] (Scientific American, )


===September 17, 2020===
===September 17, 2020===

Revision as of 05:10, 29 August 2020

Course Outline

The outline for the Fall 2020 run of Adaptive Security is available here.

Class Schedule

September 10, 2020

Introduction

September 15, 2020

September 17, 2020

September 22, 2020

September 24, 2020

September 29, 2020

October 1, 2020

December 8, 2020

Presentations 1

December 10, 2020

Presentations 2

Project Milestones

  • September 18, 2020: Areas of interest
  • September 29, 2020: Elevator Pitch
  • October 23, 2020: Literature Review
  • November 17, 2020: Tests/Preliminary Work

Readings

Initially we will read selections from past runs of Biological Approaches to Computer Security:

The focus of this class will be on designing and building actual defenses so we won't cover many of these readings. However, you may want to take a look at them for inspiration.