A Cryptographically Stable Computing Machine

dc.contributor.authorFiske, Michael
dc.date.accessioned2021-12-24T18:29:09Z
dc.date.available2021-12-24T18:29:09Z
dc.date.issued2022-01-04
dc.description.abstractMalware plays a critical role in breaching computer systems. The computing behavior of a register machine program can be sabotaged, by making a very small change to the original, uninfected program. Stability has been studied extensively in dynamical systems and in engineering. Our primary contribution introduces a computing machine that is structurally stable to small changes made to its program instructions. Our procedures use quantum randomness to build unpredictable stable instructions. Our procedures can execute just before running a program so that the computing task can be performed with a different representation of its instructions during each run. Our procedures are inspired by the Red Queen hypothesis in biology: organisms evolve using robustness, unpredictablity and variability to hinder infection. Another contribution expands the mathematical notion of stability to a cryptographic model with an adversary, and explains why structurally stable machines can be resistant to malware sabotage.
dc.format.extent10 pages
dc.identifier.doi10.24251/HICSS.2022.909
dc.identifier.isbn978-0-9981331-5-7
dc.identifier.urihttp://hdl.handle.net/10125/80251
dc.language.isoeng
dc.relation.ispartofProceedings of the 55th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectCybersecurity and Software Assurance
dc.subjecthide
dc.subjectmalware
dc.subjectquantum randomness
dc.subjectred queen hypothesis
dc.subjectstable
dc.titleA Cryptographically Stable Computing Machine
dc.type.dcmitext

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0738.pdf
Size:
395.07 KB
Format:
Adobe Portable Document Format