Slides for Lecture for February 19, 2016
Author: Matt Bishop
Given at: UC Davis
Date: February 19, 2016
First slide (slide 1)
Last slide (slide 44)
PDF version
Slide 1: Lecture for February 19, 2016
Slide 2: Presentations for Monday, February 22
Slide 3: Presentations for Wednesday, February 24
Slide 4: Execution-Based Mechanisms
Slide 5: Fenton\uc1\u8217\'d5s Data Mark Machine
Slide 6: Instruction Description
Slide 7: Instructions
Slide 8: More Instructions
Slide 9: More Instructions
Slide 10: Example Program
Slide 11: Example Execution
Slide 12: Handling Errors
Slide 13: Variable Classes
Slide 14: Example Program
Slide 15: Analysis of Example
Slide 16: Handling This (1)
Slide 17: Handling This (2)
Slide 18: Handling This (3)
Slide 19: The Confinement Problem
Slide 20: Overview
Slide 21: Example Problem
Slide 22: Generalization
Slide 23: Confinement Problem
Slide 24: Total Isolation
Slide 25: Example
Slide 26: Covert Channel
Slide 27: Rule of Transitive Confinement
Slide 28: Lipner\uc1\u8217\'d5s Notes
Slide 29: Kocher\uc1\u8217\'d5s Attack
Slide 30: Isolation
Slide 31: Virtual Machine
Slide 32: VMM as Security Kernel
Slide 33: Example 1: KVM/370
Slide 34: Example 2: VAX/VMM
Slide 35: Example 2
Slide 36: Problem
Slide 37: Sandboxes
Slide 38: Examples Limiting Environment
Slide 39: Modifying Programs
Slide 40: Example: Janus
Slide 41: Configuration File
Slide 42: How It Works
Slide 43: Use
Slide 44: Sandboxes, VMs, and TCB