Fall 2012

Paper Reading Questions

For each paper, your assignment is two-fold. By the start of lecture:

  • Submit your answer for each lecture's paper question via the submission web site in a file named lecn.txt, and
  • E-mail your own question about the paper (e.g., what you find most confusing about the paper or the paper's general context/problem) to . You cannot use the question below. To the extent possible, during lecture we will try to answer questions submitted by the evening before.

Lecture 20

How could an adversary circumvent Backtracker, so that an administrator cannot pinpoint the initial intrusion point?

Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.

Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:37 EST