Difference between revisions of "Adaptive Security (Fall 2020)"

From Soma-notes
Jump to navigation Jump to search
Line 15: Line 15:
** [https://www.jstor.org/stable/24967583 A Core War bestiary of viruses, worms and other threats to computer memories] (Sciencific American, March 1985)
** [https://www.jstor.org/stable/24967583 A Core War bestiary of viruses, worms and other threats to computer memories] (Sciencific American, March 1985)
** [https://www.jstor.org/stable/24979289 A program called MICE nibbles its way to victory at the first Core War tournament] (Scientific American, January 1987)
** [https://www.jstor.org/stable/24979289 A program called MICE nibbles its way to victory at the first Core War tournament] (Scientific American, January 1987)
** [https://www.jstor.org/stable/24987184 Of worms, viruses and Core War] (Scientific American, )
** [https://www.jstor.org/stable/24987184 Of worms, viruses and Core War] (Scientific American, March 1989)


===September 17, 2020===
===September 17, 2020===

Revision as of 01:13, 29 August 2020

Course Outline

The outline for the Fall 2020 run of Adaptive Security is available here.

Class Schedule

September 10, 2020

Introduction

September 15, 2020

September 17, 2020

September 22, 2020

September 24, 2020

September 29, 2020

October 1, 2020

December 8, 2020

Presentations 1

December 10, 2020

Presentations 2

Project Milestones

  • September 18, 2020: Areas of interest
  • September 29, 2020: Elevator Pitch
  • October 23, 2020: Literature Review
  • November 17, 2020: Tests/Preliminary Work

Readings

Initially we will read selections from past runs of Biological Approaches to Computer Security:

The focus of this class will be on designing and building actual defenses so we won't cover many of these readings. However, you may want to take a look at them for inspiration.