CS551: Security and Privacy on the Internet, Fall 2000 |
Manifest: Wednesday 1 November 2000
Assignments Due 10 November Project Progress Reports (see email for details)
Readings
No new readings: Work on your projects.
Links
- Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham. Efficient Software-Based Fault Isolation. SOSP 1993.
- Fred Schneider. Enforceable Security Policies, Cornell TR 1999.
- Ulfar Erlingsson, Fred B. Schneider. SASI Enforcement of Security Policies: A Retrospective. Proceedings of the 1999 New Security Paradigms Workshop.
- Naccio Home Page
Questions If J. Random Websurfer clicks on a button that promises dancing pigs on his computer monitor, and instead gets a hortatory message describing the potential denagers of the applet --- he's going to choose dancing pigs over computer security any day. If the computer prompts him with a warning screen like: "The applet DANCING PIGS could contain malicious code that might to permanent damage to your computer, steal your life's savings, and impair your ability to have children," he'll click "OK" without even reading it. Thirty seconds later he won't even remember that the warning screen even existed.
- What is a reference monitor?
- How does SASI work?
- What is a security policy?
- What is a safety policy?
- What are some interesting security policies that are not safety policies?
- Why is it hard to design safety policies?
- How does Naccio work?
Bruce Schneier, Secrets and Lies, 2000.
University of Virginia Department of Computer Science CS 551: Security and Privacy on the Internet |
David Evans evans@virginia.edu |