Actions

Difference between revisions of "Circumventing Turing's Achilles Heel"

From Santa Fe Institute Events Wiki

(Created page with "{|border="0" style="margin: 0px 0px 0px 10px; background: #f9f9f9; border: solid #aaa 1px;" |'''Working Group Navigation''' *Motility in the Immune System: From Microscopic...")
 
 
(5 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{|border="0" style="margin: 0px 0px 0px 10px; background: #f9f9f9; border: solid #aaa 1px;"
+
{{Circumventing Turing's Achilles Heel}}
|'''Working Group Navigation'''
+
 
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function|Home]]
+
 
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function_-_Agenda|Agenda]]
+
'''CIRCUMVENTING TURING’S ACHILLES HEEL'''<br>
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function_-_Participants|Participants]]
+
Working Group<br>
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function_-_Abstracts|Abstracts]]
+
November 14, 2016 - November 15, 2016<br>
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function_-_Questions|Questions]]
+
9:00 AM <br>
*[[Motility in the Immune System: From Microscopic Movement to Macroscopic Function_-_Bios|Related Papers]]
+
Collins Conference Room
|}
+
 
 +
 
 +
'''Abstract'''.  Much of the extraordinary success of the computer industry over the last half-century is because the vast majority of computing machines we’ve built are *general purpose computers*. Subject to the limitations of finite memory, time, and processor speed, general-purpose computers are (near) Turing complete; that is, capable of computing anything that is computable. But it’s exactly that same strategy that makes our computer and network systems so vulnerable to attack: If an outsider can gain control of your general-purpose system, then s/he can in principle use it for whatever purposes s/he is clever enough to trick your system into executing, precisely because the system is (near) Turing complete.
 +
 
 +
This Working Group will explore strategies for retaining the hardware and software advantages of general purpose computers, while denying those same general purpose capabilities to outside attackers. The focus will be on systems and applications that, by definition, require routine access from the open internet (e.g., webservers, online banking and other financial systems, etc.).

Latest revision as of 15:30, 8 November 2016

Working Group Navigation


CIRCUMVENTING TURING’S ACHILLES HEEL
Working Group
November 14, 2016 - November 15, 2016
9:00 AM
Collins Conference Room


Abstract. Much of the extraordinary success of the computer industry over the last half-century is because the vast majority of computing machines we’ve built are *general purpose computers*. Subject to the limitations of finite memory, time, and processor speed, general-purpose computers are (near) Turing complete; that is, capable of computing anything that is computable. But it’s exactly that same strategy that makes our computer and network systems so vulnerable to attack: If an outsider can gain control of your general-purpose system, then s/he can in principle use it for whatever purposes s/he is clever enough to trick your system into executing, precisely because the system is (near) Turing complete.

This Working Group will explore strategies for retaining the hardware and software advantages of general purpose computers, while denying those same general purpose capabilities to outside attackers. The focus will be on systems and applications that, by definition, require routine access from the open internet (e.g., webservers, online banking and other financial systems, etc.).