Free Executive Summary

Total Page:16

File Type:pdf, Size:1020Kb

Free Executive Summary http://www.nap.edu/catalog/1581.html We ship printed books within 1 business day; personal PDFs are available immediately. Computers at Risk: Safe Computing in the Information Age System Security Study Committee, Commission on Physical Sciences, Mathematics, and Applications, National Research Council ISBN: 0-309-57460-9, 320 pages, 6 x 9, (1991) This PDF is available from the National Academies Press at: http://www.nap.edu/catalog/1581.html Visit the National Academies Press online, the authoritative source for all books from the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council: • Download hundreds of free books in PDF • Read thousands of books online for free • Explore our innovative research tools – try the “Research Dashboard” now! • Sign up to be notified when new books are published • Purchase printed books and selected PDF files Thank you for downloading this PDF. If you have comments, questions or just want more information about the books published by the National Academies Press, you may contact our customer service department toll- free at 888-624-8373, visit us online, or send an email to [email protected]. This book plus thousands more are available at http://www.nap.edu. Copyright © National Academy of Sciences. All rights reserved. Unless otherwise indicated, all materials in this PDF File are copyrighted by the National Academy of Sciences. Distribution, posting, or copying is strictly prohibited without written permission of the National Academies Press. Request reprint permission for this book. i e h t be ion. om r ibut f r t cannot r at not o f Computers at Risk however, version ng, i t paper book, at ive Safe Computing In the Information Age at rm o riginal horit ic f o e h t he aut t om r as ing-specif t ion ed f peset System Security Study Committee y Computer Science and Telecommunications Board http://www.nap.edu/catalog/1581.html Computers atRisk:SafeComputingintheInformationAge publicat her t iles creat is h Commission on Physical Sciences, Mathematics, and Applications t L f M of and ot National Research Council X om yles, r f st version print posed e h heading Copyright © National Academy ofSciences. Allrights reserved. recom use t breaks, ease l been P word has ed. hs, insert ally line lengt original work e h t he original; ion of t at o ue t r have been accident y t a represent m are l a errors age breaks P is new digit h pographic y iles. T t f e ile: ng i f t F D P peset and som is y h t NATIONAL ACADEMY PRESS ined, a bout 1991 A ret original t ii e h t be ion. om National Academy Press 2101 Constitution Avenue, N.W. Washington, D.C. 20418 r ibut f r t cannot NOTICE: The project that is the subject of this report was approved by the Governing Board of the r at not National Research Council, whose members are drawn from the councils of the National Academy o f of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard however, for appropriate balance. version ng, i This report has been reviewed by a group other than the authors according to procedures t paper book, at ive approved by a Report Review Committee consisting of members of the National Academy of Sci- at rm ences, the National Academy of Engineering, and the Institute of Medicine. o The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distin- riginal horit ic f guished scholars engaged in scientific and engineering research, dedicated to the furtherance of o e science and technology and to their use for the general welfare. Upon the authority of the charter h t he aut granted to it by the Congress in 1863, the Academy has a mandate that requires it to advise the fed- t om eral government on scientific and technical matters. Dr. Frank Press is president of the National r as ing-specif t Academy of Sciences. ion ed f The National Academy of Engineering was established in 1964, under the charter of the peset National Academy of Sciences, as a parallel organization of outstanding engineers. It is autonomous y in its administration and in the selection of its members, sharing with the National Academy of Sci- http://www.nap.edu/catalog/1581.html Computers atRisk:SafeComputingintheInformationAge publicat ences the responsibility for advising the federal government. The National Academy of Engineering her t iles creat is also sponsors engineering programs aimed at meeting national needs, encourages education and h t L f research, and recognizes the superior achievements of engineers. Dr. Robert M. White is president M of and ot of the National Academy of Engineering. X The Institute of Medicine was established in 1970 by the National Academy of Sciences to om yles, r secure the services of eminent members of appropriate professions in the examination of policy mat- f st version ters pertaining to the health of the public. The Institute acts under the responsibility given to the National Academy of Sciences by its congressional charter to be an adviser to the federal govern- print posed ment and, upon its own initiative, to identify issues of medical care, research, and education. Dr. e h Samuel O. Thier is president of the Institute of Medicine. heading Copyright © National Academy ofSciences. Allrights reserved. The National Research Council was organized by the National Academy of Sciences in 1916 to recom use t associate the broad community of science and technology with the Academy's purposes of further- ing knowledge and advising the federal government. Functioning in accordance with general poli- breaks, ease cies determined by the Academy, the Council has become the principal operating agency of both the l been P National Academy of Sciences and the National Academy of Engineering in providing services to word has the government, the public, and the scientific and engineering communities. The Council is adminis- ed. hs, tered jointly by both Academies and the Institute of Medicine. Dr. Frank Press and Dr. Robert M. White are chairman and vice chairman, respectively, of the National Research Council. insert Support for this project was provided by the Defense Advanced Research Projects Agency ally under Contract No. N00014-89-J-1731. However, the content does not necessarily reflect the posi- line lengt tion or the policy of the Defense Advanced Research Projects Agency or the government, and no original work e official endorsement should be inferred. h t Library of Congress Cataloging-in-Publication Data Computers at risk: safe computing in the information age / System Security Study Committee, he original; Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathemat- ion of t at o ics, and Applications, National Research Council. p. cm. ue t r have been accident Includes bibliographical references. y t a represent ISBN 0-309-04388-3 m are l a 1. Computer security. I. National Research Council (U.S.). errors Computer Science and Telecommunications Board. System Security Study Committee. QA76.9.A25C6663 1990 age breaks 005.8—dc20 90-22329 P CIP is new digit h pographic Copyright © 1991 by the National Academy of Sciences y iles. T t f e ile: No part of this book may be reproduced by any mechanical, photographic, or electronic pro- ng i f t cess, or in the form of a phonographic recording, nor may it be stored in a retrieval system, transmit- F D ted, or otherwise copied for public or private use, without written permission from the publisher, P peset except for the purposes of official use by the U.S. government. and som is y h t Printed in the United States of America First Printing, December 1990 Second Printing, March 1991 ined, a bout Third Printing, April 1992 Fourth Printing January 1992 Fifth Printing March 1994 A ret original t iii e h t be ion. om r ibut f r t cannot SYSTEM SECURITY STUDY COMMITTEE r at not o f DAVID D. CLARK, Massachusetts Institute of Technology, Chairman however, W. EARL BOEBERT, Secure Computing Technology Corporation version ng, i t paper book, SUSAN GERHART, Microelectronics and Computer Technology Corporation at ive at rm JOHN V. GUTTAG, Massachusetts Institute of Technology o riginal horit RICHARD A. KEMMERER, University of California at Santa Barbara ic f o e STEPHEN T. KENT, BBN Communications h t he aut SANDRA M. MANN LAMBERT, Security Pacific Corporation t om r as ing-specif BUTLER W. LAMPSON, Digital Equipment Corporation t ion JOHN J. LANE, Shearson, Lehman, Hutton, Inc. ed f peset M. DOUGLAS McILROY, AT&T Bell Laboratories y PETER G. NEUMANN, SRI International http://www.nap.edu/catalog/1581.html Computers atRisk:SafeComputingintheInformationAge publicat her t iles creat is MICHAEL O. RABIN, Harvard University h t L f WARREN SCHMITT, Sears Technology Services M of and ot X HAROLD F. TIPTON, Rockwell International om yles, STEPHEN T. WALKER, Trusted Information Systems, Inc. r f st version WILLIS H. WARE, The RAND Corporation MARJORY S. BLUMENTHAL, Staff Director print posed e h FRANK PITTELLI, CSTB Consultant heading Copyright © National Academy ofSciences. Allrights reserved. DAMIAN M. SACCOCIO, Staff Officer recom use t MARGARET A. KNEMEYER, Staff Associate breaks, DONNA F. ALLEN, Administrative Secretary ease l been P CATHERINE A. SPARKS, Senior Secretary word has ed. hs, insert ally line lengt original work e h t he original; ion of t at o ue t r have been accident y t a represent m are l a errors age breaks P is new digit h pographic y iles.
Recommended publications
  • Evolving Assembly Programs: How Games Help M Icroprocessor Validation
    Evolving Assembly Programs: How Games Help M icroprocessor Validation F. Corno, E. Sanchez, G. Squillero Politecnico di Torino œ DAUIN Corso Duca degli Abruzzi 24 10129 TORINO œ ITALY http://www.cad.polito.it/ Contact Author: Giovanni Squillero [email protected] Politecnico di Torino œ DAUIN Corso Duca degli Abruzzi 24 10129 TORINO œ ITALY Tel: +39-011564.7092 Fax: +39-011564.7099 COPYRIGHT IEEE. PERSONAL USE OF THIS M ATERIAL IS PERM ITTED. HOW EVER, PERM ISSION TO REPRINT/REPUBLISH THIS M ATERIAL FOR ADVERTISING OR PROM OTIONAL PURPOSES OR FOR CREATING NEW COLLECTIVE W ORKS FOR RESALE OR REDISTRIBUTION TO SERVERS OR LISTS, OR TO REUSE ANY COPYRIGHTED COM PONENT OF THIS W ORK IN OTHER W ORKS, M UST BE OBTAINED FROM THE IEEE. Evolving Assembly Programs: How Games Help M icroprocessor Validation F. Corno, E. Sanchez, G. Squillero Politecnico di Torino œ DAUIN Corso Duca degli Abruzzi 24 10129 TORINO œ ITALY http://www.cad.polito.it/ Abstract Core War is a game where two or more programs, called warriors, are executed in the same memory area by a time-sharing processor. The final goal of each warrior is to crash the others by overwriting them with illegal instructions. The game was popularized by A. K. Dewdney in his column on Scientific American in mid-1980s. In order to automatically devise strong warriors, (GP, a test program generation algorithm, was extended with the ability to assimilate existing code and to detect clones; furthermore, a new selection mechanism for promoting diversity independent from fitness calculations was added.
    [Show full text]
  • Avida: a Software Platform for Research in Computational Evolutionary Biology
    Avida: A software platform for research in computational evolutionary biology Charles Ofria∗ Department of Computer Science and Engineering Michigan State University, E. Lansing, MI 48824 [email protected] Claus O. Wilke Digital Life Laboratory 136-93 California Institute of Technology, Pasadena, CA 91125 [email protected] December 3, 2003 ∗ Corresponding author, Phone: (517) 355-8389 1 Abstract Avida is a software platform for experiments with self-replicating and evolving computer programs. It provides detailed control over ex- perimental settings and protocols, a large array of measurement tools, and sophisticated methods to analyze and post-process experimental data. We explain the general principles on which Avida is built, as well as its main components and their interactions. We also explain how experiments are set up, carried out, and analyzed. Keywords: digital organisms, experimental evolution, self-replicating com- puter programs 2 Contents 1 Introduction 5 1.1 History of digital life . 6 1.2 Overview of Avida . 9 2 Avida Organisms 10 2.1 Virtual hardware . 11 2.2 Genetic Language . 12 2.2.1 Template Matching and Heads . 13 2.2.2 Nop's as Modifiers . 15 2.2.3 Memory Allocation and Division . 16 2.3 Mutations . 18 2.4 Phenotype . 19 2.5 Genotype and Species . 20 3 Avida World 21 3.1 Scheduling . 22 3.2 World Topologies and Birth Methods . 23 3.3 Environment and Resources . 25 3.4 Organism Interactions . 26 4 Experimental Environment 28 4.1 The Genesis File . 28 4.2 The Instruction Set File . 31 4.3 The Ancestral Organism . 31 4.4 The Environment File .
    [Show full text]
  • 1 Avida: Evolution Experiments with Self-Replicating Computer Programs
    1 Avida: Evolution Experiments with Self-Replicating Computer Programs Charles Ofria and Claus O. Wilke Avida is a software platform for experiments with self-replicating and evolv- ing computer programs. It provides detailed control over experimental settings and protocols, a large array of measurement tools, and sophisticated meth- ods to analyze and postprocess experimental data. This chapter explains the general principles on which Avida is built, its main components and their interactions, and gives an overview of some prior research with Avida. 1.1 Introduction to Avida When studying biological evolution, we have to overcome a large obstacle: Evolution happens extremely slowly. Traditionally, evolution has therefore been a field dominated by observation and theory, even though some regard the domestication of plants and animals as early, unwitting evolution exper- iments. Realistically, we can carry out controlled evolution experiments only with organisms that have very short generation times, so that populations can undergo hundreds of generations within a timeframe of months to a few years. With the advances in microbiology, such experiments in evolution have become feasible with bacteria and viruses [14, 39]. However, even with mi- croorganisms, evolution experiments still take a lot of time to complete and are often cumbersome to carry out. In particular, certain data can be diffi- cult or impossible to obtain, and it is often impractical to carry out enough replicas for high statistical accuracy. According to Daniel Dennett, “evolution will occur whenever and wher- ever three conditions are met: replication, variation (mutation), and differen- tial fitness (competition)” [9]. It seems to be an obvious idea to set up these conditions in a computer and to study evolution in silico rather than in vitro.
    [Show full text]
  • Protocol: How Control Exists After Decentralization, Alexander R
    protocol alexander r. galloway how control exists after decentralization Protocol leonardo Roger F. Malina, series editor The Visual Mind II, edited by Michele Emmer, 2004 Windows and Mirrors: Interaction Design, Digital Art, and the Myth of Transparency, Jay David Bolter and Diane Gromala, 2003 Designing Information Technology, Richard Coyne, 1995 Technoromanticism: Digital Narrative, Holism, and the Romance of the Real, Richard Coyne, 1999 Metal and Flesh: The Evolution of Man: Technology Takes Over, Ollivier Dyens, 2001 The Visual Mind, edited by Michele Emmer, 1994 The Robot in the Garden: Telerobotics and Telepistemology in the Age of the Internet, edited by Ken Goldberg, 2000 Virtual Art: From Illusion to Immersion, Oliver Grau, 2003 Leonardo Almanac, edited by Craig Harris, 1994 In Search of Innovation: The Xerox PARC PAIR Project, edited by Craig Harris, 1999 Uncanny Networks: Dialogues with the Virtual Intelligentsia, Geert Lovink, 2002 The Digital Dialectic: New Essays on New Media, edited by Peter Lunenfeld, 1999 Women, Art, and Technology, edited by Judy Malloy, 2003 The Language of New Media, Lev Manovich, 2000 Immersed in Technology: Art and Virtual Environments, edited by Mary Anne Moser with Douglas MacLeod, 1996 Information Arts: A Survey of Art and Research at the Intersection of Art, Science, and Tech- nology, Stephen Wilson, 2002 Protocol: How Control Exists after Decentralization, Alexander R. Galloway, 2004 Protocol How Control Exists after Decentralization Alexander R. Galloway The MIT Press Cambridge, Massachusetts London, England © 2004 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any elec- tronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.
    [Show full text]