May 12, 2025 Outline

Reading: text, §9.6, 17.1–17.2, 18.1
Assignments: Project report, due June 6 at 3:00pm; Homework #3, due May 14

Module 42 (text, §9.6)

  1. Side channels
    1. Passive attacks
    2. Active attacks

Module 48 (text, §17.1)

  1. Entropy-based analysis
    1. Flow of information from x to y
    2. Implicit flow of information

Module 49 (text, §17.2)

  1. Non-lattice policies
    1. Transitivity
    2. Information flow policy
    3. Confinement flow model

  2. Transitive non-lattice policies
    1. Quasi-ordered sets

  3. Basic policy composition

  4. Non-transitive policies
    1. Dual mappings
    2. Theorem: a dual mapping from a reflexive information flow policy into an ordered set is order-preserving

Module 50 (text, §18.1)

  1. Confinement problem
    1. What it is

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security Version of May 12, 2025 at 2:25PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh