Outline for February 19, 2016
Reading: §16, 17 in text
Due: Homework 3, due February 26 (Note change of due date)
- Administrative matters
- Presentations for February 22
- Francesco Capponi, “Securing the Software-Defined Network Control Layer”; questioner, Calvin Li
- Chaitrali Joshi, “Addressing the Challenge of IP Spoofing”; questioner, Sandeep Rasoori
- Presentations for February 24
- Mark Crompton, “A Diagnosis-Based Intrusion Detection Approach”; questioner, Yuan-Yu Chen
- Apoorva Rangaraju, “Reinforcement Learning Algorithms for Adaptive Cyber Defense Against Heartbleed”; questioner, Francesco Capponi
- Execution-based information flow mechanisms
- Fenton’s Data Mark Machine
- Variable classes
- Exception handling
- Confinement problem
- What is it?
- Total isolation
- Covert channels, side channels
- Rule of Transitive Confinement
- Isolation with virtual machines
- Sandboxes