Abstract
System security is an ongoing struggle between system designers and the hacking community. Human creativity within this community pushes software into areas never anticipated by the designers, thus revealing weaknesses. Evolutionary algorithms offer designers a new way to examine the viability of their code. Because of the use of randomness as well as direction based on evaluation, these algorithms help to simulate some aspects of the human creative process. In this work we show that already rather simple evolutionary searches allow us to find weaknesses in an operating system, a Linux version, resulting in a crash of the system and the necessity to reboot – a serious system flaw and security risk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Branke, J.: Evolutionary Optimization in Dynamic Environments. Kluwer, Dordrecht (2002)
Boneh, D., Brumley, D.: Remote timing attacks are practical. In: Proceedings of the 12th Usenix Security Symposium, pp. 1–14 (2003)
Denning, D.E.: Information Warfare and Security. Addison-Wesley, Reading (1999)
Denzinger, J., Kordt, M.: Evolutionary On-line Learning of Cooperative Behavior with Situation-Action-Pairs. In: Proc. ICMAS 2000, pp. 103–110. IEEE, Los Alamitos (2000)
Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation Journal 8(4), 443–473 (2000)
Goldberg, D.E.: The Design of Innovation: Lessons from and for Competent Genetic Algorithms. Kluwer, Dordrecht (2002)
Schultz, A.C., Grefenstette, J.J., De Jong, K.A.: Adaptive Testing of Controllers for Autonomous Vehicles. In: Proc. Symposium on Autonomous Underwater Vehicle Technology, pp. 158–164. IEEE, Los Alamitos (1992)
Leffler, S.J., McKusick, M.K., Karels, M.J., Quarterman, J.S.: The Design and Implementation of the 4.3BSD UNIX Operating System. Addison-Wesley, Reading (1989)
Thaller, G.: Software Engineering for Real-time and Embedded Systems. BHV-Verlag (1997)
United States Army. Army Field Manual-F100-6: Information Operations (1996)
Wegener, J.: Evolutionary testing of embedded systems. In: Evolutionary Algorithms for Embedded Systems Design, pp. 1–34. Kluwer, Dordrecht (2003)
The WildList Organization International. PC viruses in-the-wild - real-time, http://www.wildlist.org/WildList/Real-Time.htm (as seen October 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Denzinger, J., Williams, T. (2004). Using Evolutionary Learning of Behavior to Find Weaknesses in Operating Systems. In: Zhang, C., W. Guesgen, H., Yeap, WK. (eds) PRICAI 2004: Trends in Artificial Intelligence. PRICAI 2004. Lecture Notes in Computer Science(), vol 3157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28633-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-540-28633-2_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22817-2
Online ISBN: 978-3-540-28633-2
eBook Packages: Springer Book Archive