Skip to main content

Using Evolutionary Learning of Behavior to Find Weaknesses in Operating Systems

  • Conference paper
PRICAI 2004: Trends in Artificial Intelligence (PRICAI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3157))

Included in the following conference series:

  • 1016 Accesses

Abstract

System security is an ongoing struggle between system designers and the hacking community. Human creativity within this community pushes software into areas never anticipated by the designers, thus revealing weaknesses. Evolutionary algorithms offer designers a new way to examine the viability of their code. Because of the use of randomness as well as direction based on evaluation, these algorithms help to simulate some aspects of the human creative process. In this work we show that already rather simple evolutionary searches allow us to find weaknesses in an operating system, a Linux version, resulting in a crash of the system and the necessity to reboot – a serious system flaw and security risk.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Branke, J.: Evolutionary Optimization in Dynamic Environments. Kluwer, Dordrecht (2002)

    MATH  Google Scholar 

  2. Boneh, D., Brumley, D.: Remote timing attacks are practical. In: Proceedings of the 12th Usenix Security Symposium, pp. 1–14 (2003)

    Google Scholar 

  3. Denning, D.E.: Information Warfare and Security. Addison-Wesley, Reading (1999)

    Google Scholar 

  4. Denzinger, J., Kordt, M.: Evolutionary On-line Learning of Cooperative Behavior with Situation-Action-Pairs. In: Proc. ICMAS 2000, pp. 103–110. IEEE, Los Alamitos (2000)

    Google Scholar 

  5. Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation Journal 8(4), 443–473 (2000)

    Article  Google Scholar 

  6. Goldberg, D.E.: The Design of Innovation: Lessons from and for Competent Genetic Algorithms. Kluwer, Dordrecht (2002)

    MATH  Google Scholar 

  7. Schultz, A.C., Grefenstette, J.J., De Jong, K.A.: Adaptive Testing of Controllers for Autonomous Vehicles. In: Proc. Symposium on Autonomous Underwater Vehicle Technology, pp. 158–164. IEEE, Los Alamitos (1992)

    Chapter  Google Scholar 

  8. Leffler, S.J., McKusick, M.K., Karels, M.J., Quarterman, J.S.: The Design and Implementation of the 4.3BSD UNIX Operating System. Addison-Wesley, Reading (1989)

    MATH  Google Scholar 

  9. Thaller, G.: Software Engineering for Real-time and Embedded Systems. BHV-Verlag (1997)

    Google Scholar 

  10. United States Army. Army Field Manual-F100-6: Information Operations (1996)

    Google Scholar 

  11. Wegener, J.: Evolutionary testing of embedded systems. In: Evolutionary Algorithms for Embedded Systems Design, pp. 1–34. Kluwer, Dordrecht (2003)

    Google Scholar 

  12. The WildList Organization International. PC viruses in-the-wild - real-time, http://www.wildlist.org/WildList/Real-Time.htm (as seen October 2003)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Denzinger, J., Williams, T. (2004). Using Evolutionary Learning of Behavior to Find Weaknesses in Operating Systems. In: Zhang, C., W. Guesgen, H., Yeap, WK. (eds) PRICAI 2004: Trends in Artificial Intelligence. PRICAI 2004. Lecture Notes in Computer Science(), vol 3157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28633-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28633-2_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22817-2

  • Online ISBN: 978-3-540-28633-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics