Outline for November 18, 2024

Reading: text, §17.3–17.6, 27.1–27.2.2
Due: Homework 4, due November 25; Project presentation slides, due November 27


  1. Execution-based flow mechanisms
    1. Fenton’s Data Mark Machine
    2. Variable classes

  2. Integrity and information flow

  3. Examples
    1. Android taint analysis
    2. Firewalls

  4. Attacks
    1. Representing attacks
    2. Attack trees
    3. Requires-provides model

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 235A, Computer and Information Security
Version of November 17, 2024 at 9:18PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh