Von Neumann’s Automaton and Viruses Most slides taken from Weizmann Institute of Science and Rensselaer Polytechnic Institute.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Chapter 13 Artificial Life: Learning through Emergent Behavior.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lecture 15 Overview. Kinds of Malicious Codes Virus: a program that attaches copies of itself into other programs. – Propagates and performs some unwanted.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Introduction At the heart of the growth of a multi-cellular organism is the process of cellular division… … aka (in computing) self-replication.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting Your Computer & Your Information
The Role of Artificial Life, Cellular Automata and Emergence in the study of Artificial Intelligence Ognen Spiroski CITY Liberal Studies 2005.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
The Code of Life: A Look at Emerging Artificial Life The Virus AGCGTGGCAGC ATCCTACGACT GCACGATCCTC GATCGACGTGA CGTGACGTAGC GGGACTCGATC
Computer Viruses, Artificial Life & the Origin of Life Robert C Newman Abstracts of Powerpoint Talks - newmanlib.ibri.org -newmanlib.ibri.org.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Governor’s School for the Sciences Mathematics Day 13.
CS 484 – Artificial Intelligence1 Announcements Lab 4 due today, November 8 Homework 8 due Tuesday, November 13 ½ to 1 page description of final project.
Computer Science Dept, San Jose State University, CA Self Reproducing CA’s and Programs Shruti Parihar May 06, 2003.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Course material – G. Tempesti Course material will generally be available the day before the lecture Includes.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
CSCE 522 Lecture 12 Program Security Malicious Code.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
1 Chapter 13 Artificial Life: Learning through Emergent Behavior.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Hosted by Andrew Benson Choice1Choice 2Choice 3Choice
Program Security Malicious Code Program Security Malicious Code.
Chapter 3 Digital Logic Structures. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-2 Complete Example.
Chapter 3 Digital Logic Structures. 3-2 Combinational vs. Sequential Combinational Circuit always gives the same output for a given set of inputs  ex:
Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Cellular Automata FRES 1010 Eileen Kraemer Fall 2005.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Chapter I: Introduction to Computer Science. Computer: is a machine that accepts input data, processes the data and creates output data. This is a specific-purpose.
SEMINAR ON PC SECURITY FROM VIRUSES
Chapter 3: Operating Systems
Computer Viruses.
Computer Science 210 Computer Organization
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
THEORY OF COMPUTATION Lecture One: Automata Theory Automata Theory.
The Von Neumann Model Basic components Instruction processing
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Lecture 4 Number Systems. von Neumann Model Every computer today is based on the von Neumann Model. It is based on 3 ideas: 1.Four subsystems 2.Stored.
Malicious Program and Protection
Von Neumann’s Automaton and Viruses
Presentation transcript:

Von Neumann’s Automaton and Viruses Most slides taken from Weizmann Institute of Science and Rensselaer Polytechnic Institute

The General Question What kind of logical organization is sufficient for an automaton to control itself in such a manner that it reproduces itself?

Von Neumann Neighborhood State of the cell at time t+1 is calculable from its state and its four non-diagonal neighboring cells at time t.

States in Von Neumann Automaton Each cell is capable of 29 different states. Each state is excited or unexcited. Movement of data on the cellular lattice is determined by the changes of unexcited and excited states in cell. Cells change at discrete times according to the transition rule unexcited 00 signal 0010 t excitedunexcited 0000 t+1 10 unexcited excitedunexcited 0000 t+2 10 unexcitedexcitedunexcited 0000 t+3 10 unexcited excitedunexcited excitedunexcited 0000 t+4 01 unexcited excitedunexcited 1000 t+5 00 unexcited excited 0001 t t unexcited 0000 t unexcited

Ordinary Transmission States 4 unexcited states 4 excited states signal

Quiescent State Cells in the quiescent state U have to be excited with more than one signal directed to them. signal cell in the quiescent state cell in the ordinary transmission state

Confluent States C C 01 C C 11 C C 01 C C 11

C 10 and C 01 C 00 t C 10 t+2 C 01 t+1 C 00 t+3 Cell in confluent state directs signal to the neighboring cells not pointing to it. C C 01 C C 11 C C 01 C C 11

C 00 t t+1 C 00 t+2 C 00 t+3 All of the cells in ordinary transmission states pointing to cell in confluent state have to be excited. A not excited cell at the input of a confluent cell

C 11 C 01 t t C 11 t+1 C 10 t+2 C 00 t+3 Two dots inside The number of dots in = the number of dots out C C 01 C C 11 C C 01 C C 11

Pulser A pulser P(i 1, i 2,…, i n ) is used to encode a sequence of signals so that a single excited signal entering the input cell will produce the sequence i 1, i 2,…, i n at the output cell. input output at time t at time t+ through t+ +n

C Pulser(10101) C CC t+5 excited signal 01 tt+1 10 t+2 t+4 10 t+3 01 t+6 01 t t+8 10 t+14 1 t+12 1 t+10 1 t+11 0 t+13 0 t+9

Decoder(1x1x1) A decoder produces a single signal if the sequence it receives has signals in specified positions. CCC CCC 01 t excited signal 10 t+1 excited signal t+2 01 t excited signal t t t t t t t t t t t t+15t t t+18 1 t+19

Repeater C signal Repeater repeats the sequence of signals until it is turned off. destruction process construction process

Special Transmission States 4 unexcited states 4 excited states They are similar in operation to ordinary transmission states, but they convert confluent states to quiescent state. Special transmission states are denoted by double arrow notation

The Destruction Process The destruction process transforms unexcited and excited states into the quiescent state in single step. C 10 tt+1

Sensitive States They are intermediary states converting quiescent state into one of the 9 unexcited states C 00

The Sensitized Tree S0S S US0S0 S1S1 S 10 C S 00 S S US0S0 S1S1 S 10 quiescent state

The Construction Process t S 10 t+3 S 100 t+4t+5 S0S0 t+1 t+2 S1S1

t S 10 t+3 S 100 t+4t+5 S0S0 t+1 t+2 S1S1 S0S S11S US0S0 S1S1 S10S10 C00C S00S00 S01S S US0S0 S1S1 S10S10 quiescent state

Periodic Pulser P(11111) Repeater P(10101) C C C C CCCCC C C C C C C C C C C C C C C CC C C C C C C 1 C C 0 C C 1 C C S0S0 C S1S1 S 11 S 111 C C signal

Coded Channel D=decoder P=pulser

Transition And Output Table

Automaton o0=s0, etc

Finite Automaton

Constructing Arm

Horizontal Advance

Horizontal Advance of Constructing Arm

Vertical Advance of Constructing Arm

Horizontal Retreat of Constructing Arm

Vertical Retreat of Constructing Arm

Injection of Starting Stimulus

Reading Loop

Constructing Arm

Universal Computer

Universal Constructor

Automata Self-reproduction

Cellular Automata vs Viruses Cellular Artificial Life

Virus: Definition A simple computer program that attaches itself to a legitimate executable program, and reproduces itself when the program is run. Trojan Horse: no self-replication Worm: infects through security hole, then self- replicates through idle memory

Virus Types Boot sector viruses –Infects boot sector on diskette –Replaces it with replicated copy of virus –Hides in memory, infects all new disks Executable Viruses –Resident, direct action or a combination –Resident remains in memory and attacks every program run –Direct action may search for a new file to infect

Virus Categories Parasitic: spread on program execution through storage and transmission medium Multipartite: infects both boot sector and executables Stealth: hidden in memory to infect or redirect interrupts Polymorphic: uses encryption to change signature for each replica Dropper: places boot sector infector on disk

Computer vs. Biology String of genetic material vs. instruction set Neither capable of self-replication outside of a host Takes over cell and uses it to spread virus Unexpected and uncontrollable replication makes viruses (of either type) dangerous

Virus vs. Alife Patterns in space-time Self reproduction Information storage of self representation Metabolism Functional interaction with environment Interdependence of parts Stability under perturbations Growth Evolution< major flaw in theory

References J. Beuchat, J. Haenni, Von Neumann’s 29-State Cellular Automaton: A Hardware Implementation, IEEE Transactions On Education, Vol. 43, No. 3, A.W.Burks, Von Neumann Self-Reproducing Automata, Essay 1 from Essays on Cellular Automata. J.Signorini, How a SIMD machine can implement a complex cellular automaton? A case study: von Neumann’s 29-state cellular automaton, IEEE Proc. Supercomput.,1989.