Lecture 25 Outline

Reading: §23*
Assignments: Homework 4, due Nov. 18; Lab 4, due Nov. 18


  1. MULTICS ring mechanism
    1. Rings, gates, ring-crossing faults
    2. Used for both data and procedures; rights are REWA
      (b1, b2) access bracket—can access freely; (b3, b4) call bracket—can call segment through gate; so if a’s access bracket is (32, 35) and its call bracket is (36, 39), then assuming permission mode (REWA) allows access, a procedure in:
      rings 0–31: can access a, but ring-crossing fault occurs
      rings 32–35: can access a, no ring-crossing fault
      rings 36–39: can access a, provided a valid gate is used as an entry point
      rings 40–63: cannot access a
    3. If the procedure is accessing a data segment d, no call bracket allowed; given the above, assuming permission mode (REWA) allows access, a procedure in:
      rings 0–32: can access d
      rings 33–35: can access d, but cannot write to it (W or A)
      rings 36–63: cannot access d
  2. Malware, malicious logic
  3. Trojan horse
    1. Rootkits
    2. Replicating Trojan horse
    3. Thompson’s compiler-based replicating Trojan horse
  4. Computer virus
    1. Boot sector infector
    2. Executable infector
    3. Multipartite
    4. TSR (terminate and stay resident)
    5. Stealth
    6. Encrypted
    7. Polymorphic
    8. Metamorphic
    9. Macro
  5. Computer worm
  6. Bots, botnets
  7. Bacterium, rabbit
  8. Logic bomb
  9. Adware, spyware
  10. Ransomware
  11. Phishing


You can also obtain a PDF version of this. Version of November 18, 2016 at 11:01AM