Evolutionary Security: Winter 2025: Difference between revisions

From Soma-notes
Line 57: Line 57:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, "Software diversity: Security, Entropy, and Game Theory." (HotSec 2012)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/neti-hotsec2012.pdf Neti, "Software diversity: Security, Entropy, and Game Theory." (HotSec 2012)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, "A Fragility Metric for Software Diversity." (ASIA 2024)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-asia2024.pdf Mansourzadeh, "A Fragility Metric for Software Diversity." (ASIA 2024)]
Questions:
* What is the basic model behind both of these systems? Hint: focus on the figures!
* What aspect(s) of security are these models capturing? What are they missing?


===[[EvoSec 2025W Lecture 10|February 6, 2025]]===
===[[EvoSec 2025W Lecture 10|February 6, 2025]]===

Revision as of 01:33, 31 January 2025

Course Outline

Course outline for Evolutionary Security.

Literature Review

To help you write a literature review or the background of a research paper, read the following:

Class Schedule (Readings & Notes)

January 7, 2025

Introduction

January 9, 2025

Introduction to Trust

January 14, 2025

Computational Trust

January 16, 2025

Biological Trust

January 21, 2025

OceanStore & BOINC

January 23, 2025

Chubby & GFS

January 28, 2025

Symbiosis

January 30, 2025

Tierra

February 4, 2025

Questions:

  • What is the basic model behind both of these systems? Hint: focus on the figures!
  • What aspect(s) of security are these models capturing? What are they missing?

February 6, 2025