CS 190 Readings on Computer
Security
Fall,
2005
Papers available
from on campus only!
Group 0: Introduction
Ellison and Schneier, "Ten Risks of PKI: What you're not being told about public key
infrastructure," Computer Security Journal, Volume 16 (1), 2000.
McGraw & Morrisett , Attacking Malicious Code: A report to the Infosec Research Council, IEEE Software, Volume 17(5), September/October 2000.
Butler Lampson, Computer Security in the Real World, Marshall D. Abrams Invited Essay, presented at the Annual Computer Security Applications Conference, 2000.
Group 1:
Traditional models:
John
McLean, Security Models, from Encyclopedia of Software Engineering (ed. John Marciniak), Wiley Press,1994.
z 3 3
!#"%$'&h)( *,+,- . / * /0- 132 4 56/ 7 ! 8:9);! <;<#4'=?>)> @A$
Butler Lampson, Authentication in Distributed Systems: Theory and Practice, ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp 265-310.
Butler
Lampson, Protection, in Proc. 5th Princeton Conf. on Information Sciences and
Systems, Princeton, 1971, p.
437, reprinted in ACM Operating Systems Rev. 8,
1 (Jan. 1974), p 18.
Group 2:
Vandalism and security:
AlephOne, Breaking and entering: Smashing the Stack for
Fun and Profit (in Phrack 49 at www.phrack.org/show.php?p=49&a=14),
1996
Pincus and
Baker, Beyond Stack Smashing: Recent Advances in Exploiting Buffer
Overruns, IEEE Security & Privacy, vol. 02, no. 4,
pp. 20-27, July-August, 2004.
Group 3:
Languages-based mechanisms:
James Morris, Protection in Programming Languages, Communications of ACM, Vol 16, No. 1, January, 1973, pp. 15-21.
Joshi & Leino, Semantic approach to secure information flow, Science of Computer Programming 37 (2000) 113138.
Sabelfeld and Myers, Language-based information-flow security by, IEEE Journal on Selected Areas in Communications, Vol. 21, No. 1, January, 2003.
Group 4:
Java Virtual machine security:
Dean, Felton, Wallach, and Balfanz, Java Security: Web browsers and beyond, in Internet Besieged: Countering the Cyberspace Scofflaw, Dorothy and Peter Denning, editors, ACM Press, 1997.
Wallach, Appel, and Felten, SAFKASI: A security mechanism for Language-Based Systems, ACM Transactions on Software Engineering and Methodology, Vol. 9, No. 4, October 2000, Pages 341378.
Rivest, Cryptology, Chapter 13 of Handbook of Theoretical Computer Science, (ed. J. Van Leeuwen) vol. 1 (Elsevier, 1990), 717--755.
Saltzer, J.H. and Schroeder, M.D.
,
The protection of
information in computer systems. Proceedings of the IEEE, 63(9):1278-1308,
Sept., 1975
Glossary
Available on-line at http://www.sans.org/resources/glossary.php