Evolutionary Security: Winter 2025: Difference between revisions

From Soma-notes
Line 66: Line 66:
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, "Building Diverse Computer Systems." (HotOS 1997)]
* [https://people.scs.carleton.ca/~soma/biosec/readings/forrest-diverse.pdf Forrest, "Building Diverse Computer Systems." (HotOS 1997)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, "Towards Foundational Security Metrics." (NSPW 2024)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/mansourzadeh-nspw2024.pdf Mansourzadeh, "Towards Foundational Security Metrics." (NSPW 2024)]
'''Questions:'''
* What security problems does the Forrest paper address? What problems does it not address?
* How plausible/realistic is the model in Mansourzadeh's paper?
* To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh's paper?

Revision as of 01:36, 31 January 2025

Course Outline

Course outline for Evolutionary Security.

Literature Review

To help you write a literature review or the background of a research paper, read the following:

Class Schedule (Readings & Notes)

January 7, 2025

Introduction

January 9, 2025

Introduction to Trust

January 14, 2025

Computational Trust

January 16, 2025

Biological Trust

January 21, 2025

OceanStore & BOINC

January 23, 2025

Chubby & GFS

January 28, 2025

Symbiosis

January 30, 2025

Tierra

February 4, 2025

Questions:

  • What is the basic model behind both of these systems? Hint: focus on the figures!
  • What aspect(s) of security are these models capturing? What are they missing?

February 6, 2025

Questions:

  • What security problems does the Forrest paper address? What problems does it not address?
  • How plausible/realistic is the model in Mansourzadeh's paper?
  • To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh's paper?