Paper Reading Questions
For each paper, your assignment is two-fold. By the start of lecture:
- Submit your answer for each lecture's paper question via the
submission web site in a file named
lecn.txt , and
- E-mail your own question about the paper (e.g., what you find most confusing about
the paper or the paper's general context/problem) to
6.858-q@pdos.csail.mit.edu. You cannot
use the question below. To the extent possible, during lecture we will try to
answer questions submitted by the evening before.
Lecture 20
How could an adversary circumvent Backtracker, so that an administrator
cannot pinpoint the initial intrusion point?
|