Outline for March 15, 2006
Reading: text, §22 (except 22.6)
- Greetings and felicitations!
- Malicious logic
- Quickly review Trojan horses, viruses, bacteria;
include animal and Thompson's compiler trick
- Logic Bombs, Worms (Schoch and Hupp)
- Ideal: program to detect malicious logic
- Can be shown: not possible to be precise in most
general case
- Can detect all such programs if willing to accept
false positives
- Can constrain case enough to locate specific
malicious logic
- Can use:
- Type checking (data vs. instructions)
- Limiting rights (sandboxing)
- Limiting sharing
- Preventing or detecting changes to files
- Prevent code from acting beyond specification
(proof carrying code)
- Check statistical characteristics of programs
(more authors than known, constructs in object files not
corresponding to anything in the source)
Version of March 13, 2006 at 9:20PM
You can also obtain a PDF version of this.