Notes for February 21, 1997
-
Hello
-
Puzzle of the day
-
Bob's mail box is a symbolic link to the password file
-
Bob also owns cheryl's mail box
-
Practise: blocking writing to communicate information or do damage
-
Limit writing (use of MAC if available; show how to arrange system
executables); review quickly
- Isolation
- Quarantine
-
Trust
-
Untrusted software: what is it, example (USENET)
- Check source, programs (what to look for); C examples
- Limit who has access to what
- Your environment (how do you know what you're executing); UNIX examples
- Least privilege; above with root
-
Practise: detecting writing
-
Integrity check files à la binaudit, tripwire;
go through signature block
- LOCUS approach: encipher program, decipher as you execute.
- Co-processors: checksum each sequence of instructions, compute
checksum as you go; on difference, complain
-
Lattice Model
-
Set of classes SC is a partially ordered set under relation
¾ with GLB (greatest lower bound), LUB (least upper bound) operators
-
Note: is reflexive, transitive, antisymmetric
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 2/27/97