[ Pobierz całość w formacie PDF ]
last byte
Future Tense, one of the revolving features on this page, presents stories and
essays from the intersection of computational science and technological speculation,
their boundaries limited only by our ability to imagine what will and could be.
DOI:10.1145/1897852.1897879
Gregory Benford
future tense
catch Me if you can
Or how to lose a billion in your spare time…
i enviSiOneD anD
wrote the irst com-
puter virus in 1969 but failed to see
that viruses would become wide-
spread. Technologies don’t always
evolve as we’d like. I learned this then
but failed to catch the train I knew,
even then, would soon leave the sta-
tion. Further, I failed to see the levels
of mistrust that would derive from
malware generally. I also did not antic-
ipate that seeds of mistrust could be
blown by the gales of national rivalry
through an Internet that would some-
day iniltrate every aspect of our lives.
At the Lawrence Radiation Labo-
ratory I used the Advanced Research
Projects Administration’s network, or
ARPANet, to send brief messages to col-
leagues in other labs running over the
big, central computers we worshipped
then. However, ARPANet email had a
potentially pernicious problem—“bad
code” that could arise when research-
ers sent something new (maybe acci-
dentally), possibly sending yet other
things awry.
One day I thought maybe I could
add such code intentionally, making
a program that would copy itself de-
liberately. The biological analogy was
obvious; evolution would favor it, espe-
cially if designed to use clever methods
to hide itself and tap other programs’
energy (computing time) to further its
own genetic ends.
So I wrote some simple code and
sent it along in my next ARPANet trans-
mission. Just a few lines in Fortran
told the computer to attach them to
programs being transmitted to a par-
ticular terminal. Soon it popped up in
other programs and began propagat-
ing. By the next day it was in a lot of
otherwise unrelated code, so I wrote
a memo, emphasizing to the mavens
of the Main Computer that what I
had done could likewise be done with
considerably more malevolent intent.
Moreover, viruses could move.
I avoided “credit” for the idea for
a long time but gradually realized
the virus-infection metaphor was in-
evitable, fairly obvious in fact. In the
early 1970s it surfaced again at Liver-
more when a self-replicating program
called Creeper infected ARPANet, just
printing on a user’s video screen “I’m
the creeper, catch me if you can!” In
response, users quickly wrote the irst
antivirus program, called Reaper, to
erase Creeper. Various people rein-
vented the idea into the 1980s, when
a virus called Elk Cloner infected early
Apple computers. It was ixed quickly,
but Microsoft software proved more
vulnerable, and in 1986 a virus called
Brain started booting up with Mi-
crosoft’s disk operating system and
spread through loppy disks, stimulat-
ing creation of the antivirus industry I
had anticipated in 1970.
It is some solace, I suppose, that the
2010 second-best-selling virus-protec-
tion software was a neat little package
called Vaccine. The same basic idea was
adapted into a different kind of currency
in the hands of renowned British biolo-
gist Richard Dawkins, coining the term
“memes” to describe cultural notions
that catch on and propagate through
human cultural mechanisms. Rang-
ing from pop songs we can’t get out of
our heads all the way up to the Catho-
lic Church, memes express how cul-
tural evolution occurs so quickly, as old
memes give way to voracious new ones.
Nowadays there are nasty scrub-
everything viruses of robust ability
and myriad variations: Trojan horses,
chameleons (acts friendly, turns nas-
ty), software bombs (self-detonating
agents, destroying without cloning
themselves), logic bombs (go off given
speciic cues), time bombs (keyed by
clock time),
[COntinueD On P. 111]
112
coMMunications of the acM
|
MArch 2011
|
vol. 54
|
no. 3
last byte
replicators
(“rabbits” clone until they ill all mem-
ory), worms (traveling through net-
worked computer systems, laying eggs),
and plenty more.
Viruses were not a legacy I sought.
Inevitably, someone would invent
them; the idea requires only a simple
biological analogy. But once it would
escape into the general culture, there
would be no way back, and I didn’t want
to make my professional life around it,
lucrative as it might be. The manufac-
turers of spray-paint cans likely feel the
same way…
Consider that our cities will get
smart and be able to track us with cam-
eras on the street and with microwaves
that read the chips in our phones,
computers, even embedded beneath
our skin. The irst commercial use will
likely be to feed advertising to us, as in
the 2002 Steven Spielberg ilm
Minority
Report
. We’ll inevitably live in an arms
race against intrusive eyes, much as we
guard against computer viruses today.
Stuxnet, the virus known to have
invaded Iran’s nuclear facilities, is ap-
parently the irst malicious code de-
liberately designed to disrupt targeted
industrial processes, mutating on a
schedule to avoid erasure, interrogat-
ing the computers it invades, and send-
ing data back to its inventors. Stuxnet
is able to reprogram Siemens-manu-
factured programmable logic control-
lers and hide the changes it introduces
into them. Commands in Stuxnet code
increase the frequency of rotors in
centrifuges at Iran’s Natanz uranium-
enrichment plant so they ly apart. Yet
much of Stuxnet’s code is unremark-
able, standard stuff, lacking advanced
cloaking techniques.
Still, it’s a wholly new thing—a
smart virus with a grudge—evolv-
ing, self-aware, self-educating, craft-
ily fulilling its mission. Expect more
to come. Countries hostile to the U.S.
could likewise launch malware attacks
against U.S. facilities, using Stuxnet-
like code to attack the national power
grid or other critical infrastructure.
Though seldom discussed, U.S.
policy has traditionally been to lead in
technology while selling last-genera-
tion tech to others. Thus we are able to
defeat our own prior inventions, along
with sometimes deliberately installed
defects we might exploit later.
[COntinueD FROM P. 112]
it’s a wholly new
thing—a smart
virus with a grudge—
evolving, self-aware,
self-educating,
craftily fulilling
its mission.
ACM
Transactions on
Accessible
Computing
Stuxnet looks like a kluge with in-
ventive parts. It does not hide its pay-
load well or cover its tracks. It will not
take much effort to greatly improve
such methods (with, say, virtual ma-
chine-based obfuscation and novel
techniques for anti-debugging), what-
ever the target. Once major players use
them in nation-state rivalries, they will
surely leak into commerce, where the
stakes are immense for all of us. If Stux-
type, untraceable malware becomes a
weapon of commerce, our increasingly
global commercial competitiveness
will take on a nastier edge.
Meanwhile, if living in space be-
comes routine, the related systems will
demand levels of maintenance and con-
trol seldom required on Earth. Consid-
er that the International Space Station
spends most of its crew time just keep-
ing the place running—and potentially
can be corrupted with malware. So can
many systems to come, as our environ-
ment becomes smarter and interacts
with us invisibly, around the clock. In-
creasing interconnection of all systems
will make smart sabotage a compelling
temptation. So will malware that elicits
data from our lives or corrupts systems
we already have, in hopes we’ll be com-
pelled to replace them.
Now think beyond these early stages.
What secondary effects could emerge?
Seeds of mistrust and suspicion travel
far. But that’s the world we’ll live in,
with fresh problems we’ll be able to
attack but only if we’ve thought them
through irst.
◆
◆
◆
◆
◆
This quarterly publication is a
quarterly journal that publishes
refereed articles addressing issues
of computing as it impacts the
lives of people with disabilities.
The journal will be of particular
interest to SIGACCESS members
and delegrates to its a
�
liated
conference (i.e., ASSETS), as well
as other international accessibility
conferences.
◆
◆
◆
◆
◆
www.acm.org/taccess
www.acm.org/subscribe
Gregory Benford (gbenford@uci.edu) is a professor
of physics at the university of California, Irvine, and a
novelist, including of
Timescape
, winner of the 1980
nebula and british science Fiction awards.
© 2011 aCm 0001-0782/11/0300 $10.00
MArch 2011
|
vol. 54
|
no. 3
|
coMMunications of the acM
111
[ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl adbuxwork.keep.pl
last byte
Future Tense, one of the revolving features on this page, presents stories and
essays from the intersection of computational science and technological speculation,
their boundaries limited only by our ability to imagine what will and could be.
DOI:10.1145/1897852.1897879
Gregory Benford
future tense
catch Me if you can
Or how to lose a billion in your spare time…
i enviSiOneD anD
wrote the irst com-
puter virus in 1969 but failed to see
that viruses would become wide-
spread. Technologies don’t always
evolve as we’d like. I learned this then
but failed to catch the train I knew,
even then, would soon leave the sta-
tion. Further, I failed to see the levels
of mistrust that would derive from
malware generally. I also did not antic-
ipate that seeds of mistrust could be
blown by the gales of national rivalry
through an Internet that would some-
day iniltrate every aspect of our lives.
At the Lawrence Radiation Labo-
ratory I used the Advanced Research
Projects Administration’s network, or
ARPANet, to send brief messages to col-
leagues in other labs running over the
big, central computers we worshipped
then. However, ARPANet email had a
potentially pernicious problem—“bad
code” that could arise when research-
ers sent something new (maybe acci-
dentally), possibly sending yet other
things awry.
One day I thought maybe I could
add such code intentionally, making
a program that would copy itself de-
liberately. The biological analogy was
obvious; evolution would favor it, espe-
cially if designed to use clever methods
to hide itself and tap other programs’
energy (computing time) to further its
own genetic ends.
So I wrote some simple code and
sent it along in my next ARPANet trans-
mission. Just a few lines in Fortran
told the computer to attach them to
programs being transmitted to a par-
ticular terminal. Soon it popped up in
other programs and began propagat-
ing. By the next day it was in a lot of
otherwise unrelated code, so I wrote
a memo, emphasizing to the mavens
of the Main Computer that what I
had done could likewise be done with
considerably more malevolent intent.
Moreover, viruses could move.
I avoided “credit” for the idea for
a long time but gradually realized
the virus-infection metaphor was in-
evitable, fairly obvious in fact. In the
early 1970s it surfaced again at Liver-
more when a self-replicating program
called Creeper infected ARPANet, just
printing on a user’s video screen “I’m
the creeper, catch me if you can!” In
response, users quickly wrote the irst
antivirus program, called Reaper, to
erase Creeper. Various people rein-
vented the idea into the 1980s, when
a virus called Elk Cloner infected early
Apple computers. It was ixed quickly,
but Microsoft software proved more
vulnerable, and in 1986 a virus called
Brain started booting up with Mi-
crosoft’s disk operating system and
spread through loppy disks, stimulat-
ing creation of the antivirus industry I
had anticipated in 1970.
It is some solace, I suppose, that the
2010 second-best-selling virus-protec-
tion software was a neat little package
called Vaccine. The same basic idea was
adapted into a different kind of currency
in the hands of renowned British biolo-
gist Richard Dawkins, coining the term
“memes” to describe cultural notions
that catch on and propagate through
human cultural mechanisms. Rang-
ing from pop songs we can’t get out of
our heads all the way up to the Catho-
lic Church, memes express how cul-
tural evolution occurs so quickly, as old
memes give way to voracious new ones.
Nowadays there are nasty scrub-
everything viruses of robust ability
and myriad variations: Trojan horses,
chameleons (acts friendly, turns nas-
ty), software bombs (self-detonating
agents, destroying without cloning
themselves), logic bombs (go off given
speciic cues), time bombs (keyed by
clock time),
[COntinueD On P. 111]
112
coMMunications of the acM
|
MArch 2011
|
vol. 54
|
no. 3
last byte
replicators
(“rabbits” clone until they ill all mem-
ory), worms (traveling through net-
worked computer systems, laying eggs),
and plenty more.
Viruses were not a legacy I sought.
Inevitably, someone would invent
them; the idea requires only a simple
biological analogy. But once it would
escape into the general culture, there
would be no way back, and I didn’t want
to make my professional life around it,
lucrative as it might be. The manufac-
turers of spray-paint cans likely feel the
same way…
Consider that our cities will get
smart and be able to track us with cam-
eras on the street and with microwaves
that read the chips in our phones,
computers, even embedded beneath
our skin. The irst commercial use will
likely be to feed advertising to us, as in
the 2002 Steven Spielberg ilm
Minority
Report
. We’ll inevitably live in an arms
race against intrusive eyes, much as we
guard against computer viruses today.
Stuxnet, the virus known to have
invaded Iran’s nuclear facilities, is ap-
parently the irst malicious code de-
liberately designed to disrupt targeted
industrial processes, mutating on a
schedule to avoid erasure, interrogat-
ing the computers it invades, and send-
ing data back to its inventors. Stuxnet
is able to reprogram Siemens-manu-
factured programmable logic control-
lers and hide the changes it introduces
into them. Commands in Stuxnet code
increase the frequency of rotors in
centrifuges at Iran’s Natanz uranium-
enrichment plant so they ly apart. Yet
much of Stuxnet’s code is unremark-
able, standard stuff, lacking advanced
cloaking techniques.
Still, it’s a wholly new thing—a
smart virus with a grudge—evolv-
ing, self-aware, self-educating, craft-
ily fulilling its mission. Expect more
to come. Countries hostile to the U.S.
could likewise launch malware attacks
against U.S. facilities, using Stuxnet-
like code to attack the national power
grid or other critical infrastructure.
Though seldom discussed, U.S.
policy has traditionally been to lead in
technology while selling last-genera-
tion tech to others. Thus we are able to
defeat our own prior inventions, along
with sometimes deliberately installed
defects we might exploit later.
[COntinueD FROM P. 112]
it’s a wholly new
thing—a smart
virus with a grudge—
evolving, self-aware,
self-educating,
craftily fulilling
its mission.
ACM
Transactions on
Accessible
Computing
Stuxnet looks like a kluge with in-
ventive parts. It does not hide its pay-
load well or cover its tracks. It will not
take much effort to greatly improve
such methods (with, say, virtual ma-
chine-based obfuscation and novel
techniques for anti-debugging), what-
ever the target. Once major players use
them in nation-state rivalries, they will
surely leak into commerce, where the
stakes are immense for all of us. If Stux-
type, untraceable malware becomes a
weapon of commerce, our increasingly
global commercial competitiveness
will take on a nastier edge.
Meanwhile, if living in space be-
comes routine, the related systems will
demand levels of maintenance and con-
trol seldom required on Earth. Consid-
er that the International Space Station
spends most of its crew time just keep-
ing the place running—and potentially
can be corrupted with malware. So can
many systems to come, as our environ-
ment becomes smarter and interacts
with us invisibly, around the clock. In-
creasing interconnection of all systems
will make smart sabotage a compelling
temptation. So will malware that elicits
data from our lives or corrupts systems
we already have, in hopes we’ll be com-
pelled to replace them.
Now think beyond these early stages.
What secondary effects could emerge?
Seeds of mistrust and suspicion travel
far. But that’s the world we’ll live in,
with fresh problems we’ll be able to
attack but only if we’ve thought them
through irst.
◆
◆
◆
◆
◆
This quarterly publication is a
quarterly journal that publishes
refereed articles addressing issues
of computing as it impacts the
lives of people with disabilities.
The journal will be of particular
interest to SIGACCESS members
and delegrates to its a
�
liated
conference (i.e., ASSETS), as well
as other international accessibility
conferences.
◆
◆
◆
◆
◆
www.acm.org/taccess
www.acm.org/subscribe
Gregory Benford (gbenford@uci.edu) is a professor
of physics at the university of California, Irvine, and a
novelist, including of
Timescape
, winner of the 1980
nebula and british science Fiction awards.
© 2011 aCm 0001-0782/11/0300 $10.00
MArch 2011
|
vol. 54
|
no. 3
|
coMMunications of the acM
111
[ Pobierz całość w formacie PDF ]