Lecture 28 Outline (June 3, 2015)
Reading: §15, 22 (not 22.6), [Nac97]
Assignment: Homework 4, due June 3, 2015 (no late assignments accepted)
- Greeting and felicitations!
- Review sessions:
- Friday, June 5 at 1:10pm–2:00pm in 1003 Giedt Hall
- Monday, June 8 at 4:10pm–5:00pm in 26 Wellman
- Office hours:
- Friday, June 5 at 3:10pm–4:00pm
- Monday, June 8 at 2:10pm–3:00pm
- Tuesday, June 9 at 12:10pm–1:00pm
- Capabilities
- Capability-based addressing
- Inheritance of C-Lists
- Revocation: use of a global descriptor table
- Lock and Key
- Types and locks
- MULTICS ring mechanism
- Rings, gates, ring-crossing faults
- Used for both data and procedures; rights are REWA
- (b1, b2) access bracket—can access freely; (b3, b4) call bracket—can call segment through gate; so if a’s access bracket is (32, 35) and its call bracket is (36, 39), then assuming permission mode (REWA) allows access, a procedure in:
rings 0–31: can access a, but ring-crossing fault occurs
rings 32–35: can access a, no ring-crossing fault
rings 36–39: can access a, provided a valid gate is used as an entry point
rings 40–63: cannot access a
- If the procedure is accessing a data segment d, no call bracket allowed; given the above, assuming
permission mode (REWA) allows access, a procedure in:
rings 0–32: can access d
rings 33–35: can access d, but cannot write to it (W or A)
rings 36–63: cannot access d
- Types of malicious logic
- Trojan horse
- Replicating Trojan horse
- Thompson’s compiler-based replicating Trojan horse
- Computer virus
- Boot sector infector
- Executable infector
- Multipartite
- TSR (terminate and stay resident)
- Stealth
- Encrypted
- Polymorphic
- Metamorphic
- Macro
- Computer worm
- Bacterium, rabbit
- Logic bomb
- Others