Evolutionary Security: Winter 2025: Difference between revisions

From Soma-notes
 
Line 102: Line 102:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, "“Don’t Break My Heart!”: User Security Strategies for Online Dating." (USEC 2017)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, "“Don’t Break My Heart!”: User Security Strategies for Online Dating." (USEC 2017)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, "Can I believe you?: Establishing Trust in Computer Mediated Introductions." (NSPW 2017)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, "Can I believe you?: Establishing Trust in Computer Mediated Introductions." (NSPW 2017)]


===[[EvoSec 2025W Lecture 16|March 11, 2025]]===
===[[EvoSec 2025W Lecture 16|March 11, 2025]]===
Line 108: Line 107:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, "Securing Email Archives through User Modeling." (ACSAC 2005)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, "Securing Email Archives through User Modeling." (ACSAC 2005)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, "Fine-grained Access Control using Email Social Networks." (CATX 2013)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, "Fine-grained Access Control using Email Social Networks." (CATX 2013)]


===[[EvoSec 2025W Lecture 17|March 13, 2025]]===
===[[EvoSec 2025W Lecture 17|March 13, 2025]]===
Line 114: Line 112:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, "Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management." (ACNS 2005)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, "Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management." (ACNS 2005)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, "NetADHICT: A Tool for Understanding Network Traffic." (LISA 2007)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, "NetADHICT: A Tool for Understanding Network Traffic." (LISA 2007)]


===[[EvoSec 2025W Lecture 18|March 18, 2025]]===
===[[EvoSec 2025W Lecture 18|March 18, 2025]]===
Line 120: Line 117:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, "Towards In-Band Non-Cryptographic Authentication." (NSPW 2020)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, "Towards In-Band Non-Cryptographic Authentication." (NSPW 2020)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, "Object-Level Recombination of Commodity Applications." (GECCO 2010)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, "Object-Level Recombination of Commodity Applications." (GECCO 2010)]


===[[EvoSec 2025W Lecture 19|March 20, 2025]]===
===[[EvoSec 2025W Lecture 19|March 20, 2025]]===
Line 126: Line 122:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, "bpfbox: Simple Precise Process Confinement with eBPF." (CCSW 2020)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, "bpfbox: Simple Precise Process Confinement with eBPF." (CCSW 2020)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, "Bpfcontain: Fixing the soft underbelly of container security." (arXiv 2021)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, "Bpfcontain: Fixing the soft underbelly of container security." (arXiv 2021)]


===[[EvoSec 2025W Lecture 20|March 25, 2025]]===
===[[EvoSec 2025W Lecture 20|March 25, 2025]]===
Line 132: Line 127:
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, "Principles of a Computer Immune System." (NSPW 1997)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, "Principles of a Computer Immune System." (NSPW 1997)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)]
* [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, "Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?" (NSPW 2008)]


===[[EvoSec 2025W Lecture 21|March 27, 2025]]===
===[[EvoSec 2025W Lecture 21|March 27, 2025]]===

Latest revision as of 19:39, 1 March 2025

Course Outline

Course outline for Evolutionary Security.

Literature Review

To help you write a literature review or the background of a research paper, read the following:

Class Schedule (Readings & Notes)

January 7, 2025

Introduction

January 9, 2025

Introduction to Trust

January 14, 2025

Computational Trust

January 16, 2025

Biological Trust

January 21, 2025

OceanStore & BOINC

January 23, 2025

Chubby & GFS

January 28, 2025

Symbiosis

January 30, 2025

Tierra

February 4, 2025

Readings

Discussion Questions

  • What is the basic model behind both of these systems? Hint: focus on the figures!
  • What aspect(s) of security are these models capturing? What are they missing?

February 6, 2025

Readings

Discussion Questions

  • What security problems does the Forrest paper address? What problems does it not address?
  • How plausible/realistic is the model in Mansourzadeh's paper?
  • To what degree do the strategies described in the Forrest paper impact the KOSM and DESM metrics described in Mansourzadeh's paper?

February 11, 2025

Readings

February 13, 2025

Project elevator pitches (presentations in class)

February 25, 2025

February 27, 2025

March 4, 2025

Early Literature Review due

March 6, 2025

March 11, 2025

March 13, 2025

March 18, 2025

March 20, 2025

March 25, 2025

March 27, 2025

April 1, 2025

Presentations, Day 1

April 3, 2025

Presentations, Day 2

April 8, 2025

Presentations, Day 3