Visible to the public A Translationally Inspired Model for Autonomous Device Self-Regulation

Presented as part of the 2017 HCSS conference.

ABSTRACT

Ubiquitously networked intelligent computing platforms, in the form of single purpose computing platforms, embedded devices and the Internet of Things (IOT), are being heralded as having the possibility for widespread positive impact on all facets of society. Many industry observers believe that a failure to address critical security issues with these platforms will result in a dystopic future of compromised devices, leading to not only the invasion of personal privacy but a generic threat to the global network community and nation state cybersecurity postures.

The economics of IOT and embedded platforms require different ways of thinking about how to implement the security assurance guarantees which will be needed to avoid this dystopia. Well understood engineering practices which give us safe bridges, buildings, airplanes and pharmaceuticals provide insight into modeling techniques which can be used to implement platforms which are capable of autonomous self-regulation.

Identity derived deterministic platform behavior modeling offers system architects the ability to economically implement devices which are capable of autonomous self-regulation and which scale to projected IOT levels. Such platforms can be placed into hostile environments with the knowledge that they contain the strongest guarantees which are mathematically possible that the devices are only capable of conducting the information exchange events which have been prescribed by their designers.

This presentation will focus on the application of behavior modeling techniques to the development of high security assurance computing platforms capable of autonomous self-regulation. The theoretical discussion will focus on a device behavior model derived from actor/subject identity interactions which was inspired by translational inferences from quantum energy field modeling. The theoretical discussion will explore the mathematical limits of this approach in the form of intra- dimensional vs extra-dimensional events and the impact of this limit on formal verification.

The presentation will include a discussion of the implementation of this model in the Linux operating system which is currently being used in the development of high security assurance endpoint devices. Included in the practical discussion will be the methodologies which allow the inputs to the behavioral modeling engine to be derived from unit testing and other standard development practices.

The impact of this technology will also be discussed in the framework of its ability to implement application canisters which extend and enhance the utility of emerging trusted execution environments such as Software Guard Extensions.

--

Dr. Greg Wettstein is a registered pharmacist in both Minnesota and North Dakota. He received his Ph.D. in Pharmaceutical Sciences in 1987 from North Dakota State University under the supervision of Dr. William Shelver. His dissertation work on quantum to newtonian energy field inferences was one of the pioneering applications of multi-scale modeling to molecules of pharmacological size and interest.

Dr. Wettstein has been active in all facets of Linux development since early 1992. In 1993 he supervised the first enterprise deployment of Linux in the world, when he directed the development and implementation of an electronic medical record system on kernel version 0.96c at a major midwest healthcare institution.

In 1999, he and co-workers began worrying about the impact on information privacy and security of ubiquitously networked computing platforms. Translational research from quantum field theory provided the theoretical motivations and framework for the use of structural definitions of identity as an architectural foundation for implementing deterministically modeled and attestable information integrity architectures.

Dr. Greg, in collaboration with his Golden Retriever Izzy, currently influence high security assurance computing platform development for IDfusion from the north shore of Big Chippewa lake in the glacial moraine country of west-central Minnesota, in a diligent effort to save the world as we know it.

License: 
Creative Commons 2.5

Other available formats:

A Translationally Inspired Model for Autonomous Device Self-Regulation
Switch to experimental viewer