Fall 2013

Paper Reading Questions

For each paper, your assignment is two-fold. By 10PM the evening before lecture:

  • Submit your answer for each lecture's paper question via the submission web site in a file named lecn.txt, and
  • Submit your own question about the paper (e.g., what you find most confusing about the paper or the paper's general context/problem) in a file named qn.txt. You cannot use the question below. To the extent possible, during lecture we will try to answer questions submitted the evening before.

Lecture 7

Suppose an adversary discovers a bug in NaCl where the checker incorrectly determines the length of a particular x86 instruction. How could an adversary exploit this to escape the inner sandbox?

Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.

Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:50 EST