Adaptive Security (Fall 2020): Difference between revisions
Line 21: | Line 21: | ||
* Tom Ray, [http://people.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Tierra] (1992) | * Tom Ray, [http://people.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Tierra] (1992) | ||
<!-- | |||
===September 22, 2020=== | ===September 22, 2020=== | ||
Line 29: | Line 29: | ||
===October 1, 2020=== | ===October 1, 2020=== | ||
--> | |||
===December 8, 2020=== | ===December 8, 2020=== |
Revision as of 05:24, 29 August 2020
Course Outline
The outline for the Fall 2020 run of Adaptive Security is available here.
Class Schedule
September 10, 2020
Introduction
September 15, 2020
- A. K. Dewdney, Core Wars (local copy)
- In the game called Core War hostile programs engage in a battle of bits. (Scientific American, May 1984)
- A Core War bestiary of viruses, worms and other threats to computer memories (Sciencific American, March 1985)
- A program called MICE nibbles its way to victory at the first Core War tournament (Scientific American, January 1987)
- Of worms, viruses and Core War (Scientific American, March 1989)
September 17, 2020
- Tom Ray, Tierra (1992)
December 8, 2020
Presentations 1
December 10, 2020
Presentations 2
Project Milestones
- September 18, 2020: Areas of interest
- September 29, 2020: Elevator Pitch
- October 23, 2020: Literature Review
- November 17, 2020: Tests/Preliminary Work
Readings
Initially we will read selections from past runs of Biological Approaches to Computer Security:
The focus of this class will be on designing and building actual defenses so we won't cover many of these readings. However, you may want to take a look at them for inspiration.