A Cryptographically Stable Computing Machine
Files
Date
2022-01-04
Authors
Contributor
Advisor
Department
Instructor
Depositor
Speaker
Researcher
Consultant
Interviewer
Narrator
Transcriber
Annotator
Journal Title
Journal ISSN
Volume Title
Publisher
Volume
Number/Issue
Starting Page
Ending Page
Alternative Title
Abstract
Malware plays a critical role in breaching computer systems. The computing behavior of a register machine program can be sabotaged, by making a very small change to the original, uninfected program. Stability has been studied extensively in dynamical systems and in engineering. Our primary contribution introduces a computing machine that is structurally stable to small changes made to its program instructions. Our procedures use quantum randomness to build unpredictable stable instructions. Our procedures can execute just before running a program so that the computing task can be performed with a different representation of its instructions during each run. Our procedures are inspired by the Red Queen hypothesis in biology: organisms evolve using robustness, unpredictablity and variability to hinder infection. Another contribution expands the mathematical notion of stability to a cryptographic model with an adversary, and explains why structurally stable machines can be resistant to malware sabotage.
Description
Keywords
Cybersecurity and Software Assurance, hide, malware, quantum randomness, red queen hypothesis, stable
Citation
Extent
10 pages
Format
Geographic Location
Time Period
Related To
Proceedings of the 55th Hawaii International Conference on System Sciences
Related To (URI)
Table of Contents
Rights
Attribution-NonCommercial-NoDerivatives 4.0 International
Rights Holder
Local Contexts
Collections
Email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.