Outline for March 6, 2001

  1. Greetings and felicitations!
    1. Structure of a presentation: title & team, outline, body, conclusions; list sources in conclusion
    2. Paper: please use at least 10 point, preferably 12 point, fonts (for my eyes!) and put it into Postscript of PDF. Submit in the usual way.
  2. Malicious Logic: Defenses
    1. Type enforcement
    2. Limiting protection domain
    3. Sharing
    4. Integrity checking
    5. Acting beyond specification
    6. Statistical (anomaly) detection
  3. Examples
    1. Hydra and capabilities: amplification of rights
    2. Amoeba and capabilities: protecting capabilities
    3. Andrew: positive and negative rights

Matt Bishop
Office: 3059 Engineering Unit II Phone: +1 (530) 752-8060
Fax: +1 (530) 752-4767
Email: bishop@cs.ucdavis.edu
Copyright Matt Bishop, 2001. All federal and state copyrights reserved for all original material presented in this course through any medium, including lecture or print.

Page last modified on 3/5/2001