Evolutionary Security: Winter 2025: Difference between revisions
 Created page with "==Course Outline==  Course outline for Evolutionary Security."  | 
				|||
| (37 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
[[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].  | [[EvoSec 2025W: Course Outline|Course outline for Evolutionary Security]].  | ||
==Literature Review==  | |||
To help you write a literature review or the background of a research paper, read the following:  | |||
* Harvey, "What Is a Literature Review?" [https://www.cs.cmu.edu/~missy/WritingaLiteratureReview.doc (DOC)] [https://www.cs.cmu.edu/~missy/Writing_a_Literature_Review.ppt (PPT)]  | |||
* [https://www.writing.utoronto.ca/advice/specific-types-of-writing/literature-review Taylor, "The Literature Review: A Few Tips On Conducting It"]  | |||
==Class Schedule (Readings & Notes)==  | |||
===[[EvoSec 2025W Lecture 1|January 7, 2025]]===  | |||
Introduction  | |||
===[[EvoSec 2025W Lecture 2|January 9, 2025]]===  | |||
Introduction to Trust  | |||
===[[EvoSec 2025W Lecture 3|January 14, 2025]]===  | |||
Computational Trust  | |||
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/marsh1994-formalising-trust.pdf Marsh, "Formalising Trust as a Computational Concept."] (Chapters 1 & 3)  | |||
===[[EvoSec 2025W Lecture 4|January 16, 2025]]===  | |||
Biological Trust  | |||
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/bateson1998-trust.pdf Bateson, "The Biological Evolution of Cooperation and Trust."] (1988)  | |||
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/michod2001-multicellularity.pdf Michod & Roze, "Cooperation and conflict in the evolution of multicellularity."] (2001)  | |||
===[[EvoSec 2025W Lecture 5|January 21, 2025]]===  | |||
OceanStore & BOINC  | |||
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/oceanstore-sigplan.pdf John Kubiatowicz et al., "OceanStore: An Architecture for Global-Scale Persistent Storage" (SIGPLAN 2000)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/fast2003-pond.pdf Sean Rhea et al., "Pond: the OceanStore Prototype" (FAST 2003)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/distos/fall2008/anderson-boinc.pdf Anderson, "BOINC: A System for Public-Resource Computing and Storage" (Grid Computing 2004)]  | |||
===[[EvoSec 2025W Lecture 6|January 23, 2025]]===  | |||
Chubby & GFS  | |||
* [https://www.usenix.org/legacy/events/osdi06/tech/burrows.html Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)]  | |||
* [https://research.google.com/archive/gfs-sosp2003.pdf Sanjay Ghemawat et al., "The Google File System" (SOSP 2003)]  | |||
===[[EvoSec 2025W Lecture 7|January 28, 2025]]===  | |||
Symbiosis  | |||
* [https://homeostasis.scs.carleton.ca/~soma/evosec/readings/margulis1971-sciam.pdf Margulis, Symbiosis and Evolution (Scientific American 1971)]  | |||
===[[EvoSec 2025W Lecture 8|January 30, 2025]]===  | |||
Tierra  | |||
* Tom Ray, Tierra (1992): [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/tierra-92-08-042.pdf Pixelated but with Figures], [https://homeostasis.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Clearer Text]  | |||
===[[EvoSec 2025W Lecture 9|February 4, 2025]]===  | |||
====Readings====  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, "Software diversity: Security, Entropy, and Game Theory." (HotSec 2012)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, "A Fragility Metric for Software Diversity." (ASIA 2024)]  | |||
====Discussion Questions====  | |||
* What is the basic model behind both of these systems? Hint: focus on the figures!  | |||
* What aspect(s) of security are these models capturing? What are they missing?  | |||
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===  | |||
====Readings====  | |||
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, "Building Diverse Computer Systems." (HotOS 1997)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, "Towards Foundational Security Metrics." (NSPW 2024)]  | |||
====Discussion Questions====  | |||
* What security problems does the Forrest paper address? What problems does it not address?  | |||
* How plausible/realistic is the model in Mansourzadeh's paper?  | |||
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh's paper?  | |||
===[[EvoSec 2025W Lecture 11|February 11, 2025]]===  | |||
====Readings====  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-ieeesp96.pdf Forrest, "A Sense of Self for Unix Processes." (IEEE SP 1996)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/forrest-acsac2008.pdf Forrest, "The Evolution of System-call Monitoring." (ACSAC 2008)]  | |||
===February 13, 2025===  | |||
Project elevator pitches (presentations in class)  | |||
===[[EvoSec 2025W Lecture 12|February 25, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/oda-asia-08.pdf Oda, "Content Provider Conflict on the Modern Web." (ASIA 2008)]  | |||
===[[EvoSec 2025W Lecture 13|February 27, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf Somayaji, "Evaluating Security Products with Clinical Trials." (CSET 2009)]  | |||
===[[EvoSec 2025W Lecture 14|March 4, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, "Towards Narrative Authentication: or, against boring authentication." (NSPW 2013)]  | |||
'''Early Literature Review due'''  | |||
===[[EvoSec 2025W Lecture 15|March 6, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, "“Don’t Break My Heart!”: User Security Strategies for Online Dating." (USEC 2017)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, "Can I believe you?: Establishing Trust in Computer Mediated Introductions." (NSPW 2017)]  | |||
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, "Securing Email Archives through User Modeling." (ACSAC 2005)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, "Fine-grained Access Control using Email Social Networks." (CATX 2013)]  | |||
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, "Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management." (ACNS 2005)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, "NetADHICT: A Tool for Understanding Network Traffic." (LISA 2007)]  | |||
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, "Towards In-Band Non-Cryptographic Authentication." (NSPW 2020)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, "Object-Level Recombination of Commodity Applications." (GECCO 2010)]  | |||
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, "bpfbox: Simple Precise Process Confinement with eBPF." (CCSW 2020)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, "Bpfcontain: Fixing the soft underbelly of container security." (arXiv 2021)]  | |||
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, "Principles of a Computer Immune System." (NSPW 1997)]  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)]  | |||
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===  | |||
* [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, "After the BlockCloud Apocalypse." (NSPW 2018)]  | |||
===[[EvoSec 2025W Lecture 22|April 1, 2025]]===  | |||
Presentations, Day 1  | |||
===[[EvoSec 2025W Lecture 23|April 3, 2025]]===  | |||
Presentations, Day 2  | |||
===[[EvoSec 2025W Lecture 24|April 8, 2025]]===  | |||
Presentations, Day 3  | |||
Latest revision as of 19:39, 1 March 2025
Course Outline
Course outline for Evolutionary Security.
Literature Review
To help you write a literature review or the background of a research paper, read the following:
- Harvey, "What Is a Literature Review?" (DOC) (PPT)
 - Taylor, "The Literature Review: A Few Tips On Conducting It"
 
Class Schedule (Readings & Notes)
January 7, 2025
Introduction
January 9, 2025
Introduction to Trust
January 14, 2025
Computational Trust
- Marsh, "Formalising Trust as a Computational Concept." (Chapters 1 & 3)
 
January 16, 2025
Biological Trust
- Bateson, "The Biological Evolution of Cooperation and Trust." (1988)
 - Michod & Roze, "Cooperation and conflict in the evolution of multicellularity." (2001)
 
January 21, 2025
OceanStore & BOINC
- John Kubiatowicz et al., "OceanStore: An Architecture for Global-Scale Persistent Storage" (SIGPLAN 2000)
 - Sean Rhea et al., "Pond: the OceanStore Prototype" (FAST 2003)
 - Anderson, "BOINC: A System for Public-Resource Computing and Storage" (Grid Computing 2004)
 
January 23, 2025
Chubby & GFS
- Burrows, The Chubby Lock Service for Loosely-Coupled Distributed Systems (OSDI 2006)
 - Sanjay Ghemawat et al., "The Google File System" (SOSP 2003)
 
January 28, 2025
Symbiosis
January 30, 2025
Tierra
- Tom Ray, Tierra (1992): Pixelated but with Figures, Clearer Text
 
February 4, 2025
Readings
- Neti, "Software diversity: Security, Entropy, and Game Theory." (HotSec 2012)
 - Mansourzadeh, "A Fragility Metric for Software Diversity." (ASIA 2024)
 
Discussion Questions
- What is the basic model behind both of these systems? Hint: focus on the figures!
 - What aspect(s) of security are these models capturing? What are they missing?
 
February 6, 2025
Readings
- Forrest, "Building Diverse Computer Systems." (HotOS 1997)
 - Mansourzadeh, "Towards Foundational Security Metrics." (NSPW 2024)
 
Discussion Questions
- What security problems does the Forrest paper address? What problems does it not address?
 - How plausible/realistic is the model in Mansourzadeh's paper?
 - To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh's paper?
 
February 11, 2025
Readings
- Forrest, "A Sense of Self for Unix Processes." (IEEE SP 1996)
 - Forrest, "The Evolution of System-call Monitoring." (ACSAC 2008)
 
February 13, 2025
Project elevator pitches (presentations in class)
February 25, 2025
February 27, 2025
March 4, 2025
Early Literature Review due
March 6, 2025
- Obada-Obieh, "“Don’t Break My Heart!”: User Security Strategies for Online Dating." (USEC 2017)
 - Obada-Obieh, "Can I believe you?: Establishing Trust in Computer Mediated Introductions." (NSPW 2017)
 
March 11, 2025
- Li, "Securing Email Archives through User Modeling." (ACSAC 2005)
 - Li, "Fine-grained Access Control using Email Social Networks." (CATX 2013)
 
March 13, 2025
- Matrawy, "Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management." (ACNS 2005)
 - Inoue, "NetADHICT: A Tool for Understanding Network Traffic." (LISA 2007)
 
March 18, 2025
- Dabbour, "Towards In-Band Non-Cryptographic Authentication." (NSPW 2020)
 - Foster, "Object-Level Recombination of Commodity Applications." (GECCO 2010)
 
March 20, 2025
- Findlay, "bpfbox: Simple Precise Process Confinement with eBPF." (CCSW 2020)
 - Findlay, "Bpfcontain: Fixing the soft underbelly of container security." (arXiv 2021)
 
March 25, 2025
- Somayaji, "Principles of a Computer Immune System." (NSPW 1997)
 - Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)
 
March 27, 2025
April 1, 2025
Presentations, Day 1
April 3, 2025
Presentations, Day 2
April 8, 2025
Presentations, Day 3