Outline for November 13, 2024

Reading: text, §23.9.2–23.9.7, 17.1, Appendix C
Due: Homework 4, due November 25; Project presentation slides, due November 27


  1. Defenses
    1. Distinguishing between data and instructions
    2. Containment
    3. Reducing the protection domain
    4. Trusted systems
    5. Specifications as restrictions
    6. Limiting sharing
    7. Statistical analysis
    8. Trust

  2. Entropy-based analysis
    1. Flow of information from x to y
    2. Implicit flow of information

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 235A, Computer and Information Security
Version of November 12, 2024 at 9:58PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh