PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
Modern computing systems demonstrate strong propensity for unintended, emergent computations and the related unintended, emergent programming models that enable or amplify cyber-attacks. Computing mechanisms built for a particular purpose and with particular intended models of execution prove to be capable of executing unintended computing tasks outside of their original specification and their designers and programmers' mental models. We start examining systems for signs of emergent behavior (with methods such as fuzz-testing) only after they are fully built. However, a system's exploitability models and propensity for emergent execution arise-and can also therefore be mitigated-already at the design stage.
Sergey Bratus
"Mitigating emergent computation: the need for new approaches in systems engineering", Proc. SPIE 11751, Disruptive Technologies in Information Sciences V, 1175108 (12 April 2021); https://doi.org/10.1117/12.2589675
ACCESS THE FULL ARTICLE
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
The alert did not successfully save. Please try again later.
Sergey Bratus, "Mitigating emergent computation: the need for new approaches in systems engineering," Proc. SPIE 11751, Disruptive Technologies in Information Sciences V, 1175108 (12 April 2021); https://doi.org/10.1117/12.2589675