Wed., Sep. 28 |
Introduction
Reading:
|
Wed., Oct. 5 |
Multics
Reading:
|
Wed., Oct. 12 |
Confidentiality
Reading:
|
Wed., Oct. 19 |
Operating Systems
Reading:
- Peter G. Neumann and Richard J. Feiertag,
PSOS
Revisited, 2003.
- Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason,
and Clifford E. Kahn,
A
Retrospective on the VAX VMM Security Kernel, 1991.
- Steve Lipner, Trent Jaeger, and Mary Ellen Zurko,
Lessons
from VAX/SVS for High Assurance VM Systems, 2012.
|
Wed., Oct. 26 |
The Orange Book
Reading:
|
Wed., Nov. 2 |
The Orange Book (cont.)
Reading:
|
Wed., Nov. 9 |
SCOMP/STOP
Reading:
|
Wed., Nov. 16 |
Covert Channels
Reading:
- Steven B. Lipner,
A
Comment on the Confinement Problem, 1975.
- Terry C. Vickers Benzel,
Analysis
of a Kernel Verification, 1984, section VII.
- Timothy E. Levin and Albert Yao,
Covert
Storage Channel Analysis: A Worked Example, 1990 (pp. 23–32 in PDF)
- John C. Wray,
An
Analysis of Covert Timing Channels, 1991.
- Richard A. Kemmerer,
A
Practical Approach to Identifying Storage and Timing Channels:
Twenty Years Later, 2002
|
Wed., Nov. 23 |
Virtualization
Reading:
- Clark Weissman, Secure
Computer Operation with Virtual Machine Partitioning, 1975.
- Gerald J. Popek and Charles S. Kline,
A
Verifiable Protection System, 1975.
- Marvin Shaefer, Barry D. Gold, Richard R. Linde, and
John Scheid,
Program
Confinement in KVM/370, 1977.
- Barry D. Gold, Richard R. Linde, and Paul F. Cudney,
KVM/370
in Retrospect, 1984.
- (The VAX VMM readings from October 19.)
|
Wed., Nov. 30 |
Wrapping Up
Reading:
|