EvoSec 2025W Lecture 20: Difference between revisions
Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, "Principles of a Computer Immune System." (NSPW 1997)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)] ==Discussion Questions== * How does evolution relate to biologically-inspired security? * How does trust relate to biologically-inspired sec..." |
No edit summary |
||
Line 9: | Line 9: | ||
* How does trust relate to biologically-inspired security? | * How does trust relate to biologically-inspired security? | ||
* What do you think of the panel question "Is there anything left to learn?" Is it the right question to ask about biologically-inspired security? | * What do you think of the panel question "Is there anything left to learn?" Is it the right question to ask about biologically-inspired security? | ||
==Notes== | |||
<pre> | |||
Lecture 20 | |||
---------- | |||
G1 | |||
- biology has created working security systems, so reasonable to try replicating | |||
- trust is the basis of everything, including bio-inspired security | |||
- question is a bit stubborn | |||
- hasn't been good for past scientists who have said this | |||
- was more "what's next to learn" | |||
- how can you replicate vaccines in computers? | |||
- computer vaccines would also have to change over time in response | |||
to attacker innovation | |||
- "inactivated malware"? | |||
- barely scratched the surface of how the brain works, so still lots to learn | |||
G2 | |||
- evolution is a testbed for security mechanisms in biology | |||
- biological entities don't protect secrets | |||
- we keep learning more about biology | |||
- what is the purpose of learning from biology? | |||
- we've pulled in the big concepts, so we may be on the downward slope | |||
- focus on more niche features of biology | |||
- we've used the big ones | |||
G3 | |||
- bio-inspired security is based on a system that evolved, so is related to evolution | |||
- trust arises in how malicious activities can be detected and stopped while normal system functioning is allowed to proceed | |||
- question is what is left to learn | |||
- gap between fields seems to be growing, not much communication | |||
- lots of crossover between other fields, why isn't it there in security? | |||
Project presentations | |||
- 5-10 minute presentations | |||
- just present your project | |||
- basic idea | |||
- what you've done | |||
- what you're going to do | |||
- make sure to spend 1-2 slides explaining the research problem/area | |||
- why are you doing this work? | |||
- for the literature review part, give a high-level overview | |||
of past work | |||
- for proposals, do a brief lit review (1-2 slides) then describe | |||
your proposed research | |||
- have between 5-10 slides | |||
- 5 is probably enough | |||
- "Principles" was my first first-author publication | |||
- the principles part holds up today in terms of "what is cool" about | |||
immunology from a computer security perspective | |||
- Panel came out of a rejected paper | |||
- bit of a consolation prize | |||
No "subsystem" in biology does exactly what you think it does | |||
- the systems evolved, they weren't designed | |||
- so no clear separation of concerns | |||
- immune system is for maintaining homeostasis, not "security" | |||
- co-existence is always an option | |||
- immune system is also a "distributed nervous system" | |||
- neurotransmitters are similar or are the same as the chemicals that | |||
immune cells use to communicate | |||
When we talk about "bio inspired security" or any cross-disciplinary work, | |||
we are comparing models to models | |||
- mapping models onto models is a subtle business | |||
- can often lead to more confusion than clarity | |||
living systems evolved, so they survived in the face of evolving threats | |||
- neat trick to learn for computer security! | |||
- but...do we understand how they evolved? | |||
Rather than metaphors, I want to get at underlying principles | |||
- solid foundations rather than shaky mappings | |||
That foundation is clearly evolution, at least in part | |||
- but I think we got evolution wrong | |||
evolution (to me) is an interplay between cooperation and conflict | |||
- cooperation is a key survival strategy | |||
- but cooperation is only safe if it is with those you trust | |||
- those who won't betray you for personal or short-term gain | |||
The central problem of computer security is making sure systems cooperate | |||
only with those who are trustworthy | |||
- more than "authorized" as credentials can be compromised | |||
so from this perspective, computer security IS the problem of how to evolve computers in a world where trust isn't assumed | |||
(note we mostly assume code, systems, services are trustworthy and thus can be trusted, and when they aren't our systems just break horribly) | |||
bio-inspired security is the process of learning from systems that don't assume trust - how can they be built, how can they work? | |||
- but living systems are interesting just to the extent they are examples of such systems | |||
</pre> |
Latest revision as of 18:53, 25 March 2025
Readings
- Somayaji, "Principles of a Computer Immune System." (NSPW 1997)
- Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)
Discussion Questions
- How does evolution relate to biologically-inspired security?
- How does trust relate to biologically-inspired security?
- What do you think of the panel question "Is there anything left to learn?" Is it the right question to ask about biologically-inspired security?
Notes
Lecture 20 ---------- G1 - biology has created working security systems, so reasonable to try replicating - trust is the basis of everything, including bio-inspired security - question is a bit stubborn - hasn't been good for past scientists who have said this - was more "what's next to learn" - how can you replicate vaccines in computers? - computer vaccines would also have to change over time in response to attacker innovation - "inactivated malware"? - barely scratched the surface of how the brain works, so still lots to learn G2 - evolution is a testbed for security mechanisms in biology - biological entities don't protect secrets - we keep learning more about biology - what is the purpose of learning from biology? - we've pulled in the big concepts, so we may be on the downward slope - focus on more niche features of biology - we've used the big ones G3 - bio-inspired security is based on a system that evolved, so is related to evolution - trust arises in how malicious activities can be detected and stopped while normal system functioning is allowed to proceed - question is what is left to learn - gap between fields seems to be growing, not much communication - lots of crossover between other fields, why isn't it there in security? Project presentations - 5-10 minute presentations - just present your project - basic idea - what you've done - what you're going to do - make sure to spend 1-2 slides explaining the research problem/area - why are you doing this work? - for the literature review part, give a high-level overview of past work - for proposals, do a brief lit review (1-2 slides) then describe your proposed research - have between 5-10 slides - 5 is probably enough - "Principles" was my first first-author publication - the principles part holds up today in terms of "what is cool" about immunology from a computer security perspective - Panel came out of a rejected paper - bit of a consolation prize No "subsystem" in biology does exactly what you think it does - the systems evolved, they weren't designed - so no clear separation of concerns - immune system is for maintaining homeostasis, not "security" - co-existence is always an option - immune system is also a "distributed nervous system" - neurotransmitters are similar or are the same as the chemicals that immune cells use to communicate When we talk about "bio inspired security" or any cross-disciplinary work, we are comparing models to models - mapping models onto models is a subtle business - can often lead to more confusion than clarity living systems evolved, so they survived in the face of evolving threats - neat trick to learn for computer security! - but...do we understand how they evolved? Rather than metaphors, I want to get at underlying principles - solid foundations rather than shaky mappings That foundation is clearly evolution, at least in part - but I think we got evolution wrong evolution (to me) is an interplay between cooperation and conflict - cooperation is a key survival strategy - but cooperation is only safe if it is with those you trust - those who won't betray you for personal or short-term gain The central problem of computer security is making sure systems cooperate only with those who are trustworthy - more than "authorized" as credentials can be compromised so from this perspective, computer security IS the problem of how to evolve computers in a world where trust isn't assumed (note we mostly assume code, systems, services are trustworthy and thus can be trusted, and when they aren't our systems just break horribly) bio-inspired security is the process of learning from systems that don't assume trust - how can they be built, how can they work? - but living systems are interesting just to the extent they are examples of such systems