Outline for March 6, 2001 1. Greetings and felicitations! a. Structure of a presentation: title & team, outline, body, conclusions; list sources in conclusion b. Paper: please use at least 10 point, preferably 12 point, fonts (for my eyes!) and put it into Postscript of PDF. Submit in the usual way. 2. Malicious Logic: Defenses a. Type enforcement b. Limiting protection domain c. Sharing d. Integrity checking e. Acting beyond specification f. Statistical (anomaly) detection 3. Examples a. Hydra and capabilities: amplification of rights b. Amoeba and capabilities: protecting capabilities c. Andrew: positive and negative rights