CS5430: System Security - Topic Outline (Spring 2025)
The outline lists the topics to be covered in class this semester.
Readings to accompany each topic are also listed.
Note.
Cornell University Policy
restricts the use of notes,
which are copyright F.B. Schneider with all rights reserved.
Topic Outline
- Introduction [pages 1-26]
- Basic terminologyx
- Enforcement mechanisms and principles
- Gold Standard and accountability
- Assurance and trust
- Authentication of machines
- Authentication of humans [pages 37-59, 67-80]
- Authorization
- Discretionary access control (DAC)
[pages 129-134, 140-153, 157-169]
- Access control matrix
- Access control lists
- Capabilities
- Tagged memory implementation
- Protected storage implementation
- Type-checking implementation
- Case study: Access control in UNIX
- Mandatory access control (MAC)
[pages 195, 206-223]
- Measured Principals and Gating Functions
- Information Flow
- Labels and Noninterference Policies
- Enforcement of TINI
- Enforcement of PSNI
- Flow-senstive labels
- Enforcement mechanisms
- Isolation[pages 301-308]
- Monitoring
[pages 337-340, 344-347]
- Reference monitors
- EM enforceability
- Program Rewriting[pages 351-363, 369-375]
- Software-based Fault Isolation (SFI)
- Inlined Reference Monitors
- Proof Carrying Code (PCC)
Appendix: Some Notes on Cryptography