Adaptive Security (Fall 2020): Difference between revisions
Line 2: | Line 2: | ||
The outline for the Fall 2020 run of Adaptive Security is available [[Adaptive Security Course Outline (2020F)|here]]. | The outline for the Fall 2020 run of Adaptive Security is available [[Adaptive Security Course Outline (2020F)|here]]. | ||
'''Zoom link info is in cuLearn. If you can't access it, please email anilsomayaji at cunet.carleton.ca!''' | |||
==Class Schedule== | ==Class Schedule== |
Revision as of 16:27, 8 September 2020
Course Outline
The outline for the Fall 2020 run of Adaptive Security is available here.
Zoom link info is in cuLearn. If you can't access it, please email anilsomayaji at cunet.carleton.ca!
Class Schedule
September 10, 2020
Introduction
September 15, 2020
- A. K. Dewdney, Core Wars (local copy)
- In the game called Core War hostile programs engage in a battle of bits. (Scientific American, May 1984)
- A Core War bestiary of viruses, worms and other threats to computer memories (Sciencific American, March 1985)
- A program called MICE nibbles its way to victory at the first Core War tournament (Scientific American, January 1987)
- Of worms, viruses and Core War (Scientific American, March 1989)
September 17, 2020
- Tom Ray, Tierra (1992)
December 8, 2020
Presentations 1
December 10, 2020
Presentations 2
Project Milestones
- September 18, 2020: Areas of interest
- September 29, 2020: Elevator Pitch
- October 23, 2020: Literature Review
- November 17, 2020: Tests/Preliminary Work
Readings
Initially we will read selections from past runs of Biological Approaches to Computer Security:
The focus of this class will be on designing and building actual defenses so we won't cover many of these readings. However, you may want to take a look at them for inspiration.