6.033 Spring 2005: Preparation for Recitation 21
Tuesday, April 26
Read appendix B of chapter 11. This appendix provides a collection of war stories about security holes in supposedly-secure systems. Some of the security problems are due to stupidity, but many emerged even though the designers were smart and had the best intentions. Read them all through. Then, reread 5.2 (Nonobvious Trust (TOCTTOU)), 5.3 (Virtualizing the DMA (TOCTTOU 2)), 11.1 (But I Thought It Was Secure), and 16 (Framing Enigma) and identify the principles from section A.4 of chapter 11 that were violated in these three case studies.
|