Return-Path: XPUM04@prime-a.central-services.umist.ac.uk
Received: from G.SEI.CMU.EDU by ubu.cert.sei.cmu.edu (5.61/2.3)
        id AA13844; Fri, 1 Jun 90 11:30:49 -0400
Received: from SEI.CMU.EDU by g.sei.cmu.edu (5.61/2.5)
        id AA20593; Fri, 1 Jun 90 11:30:42 -0400
Received: from nsfnet-relay.ac.uk by sei.cmu.edu (5.61/2.3)
        id AA00806; Fri, 1 Jun 90 11:30:26 -0400
Received: from sun.nsfnet-relay.ac.uk by vax.NSFnet-Relay.AC.UK 
           via Janet with NIFTP  id aa23531; 1 Jun 90 16:08 BST
From: Anthony Appleyard <XPUM04@prime-a.central-services.umist.ac.uk>
To: KRVW <@NSFnet-Relay.AC.UK:KRVW@sei.cmu.edu>
Date:         Fri, 01 Jun 90 16:08:24 BST 
Message-Id:   <$TGTWCZCFFBTD at UMPA>
Subject:      Virus-L vol 0 issue #0520



Virus-L Digest Fri, 20 May 88, Volume 0 : Issue #0520

Today's Topics

Re: Signature lengths
Re: Signature lengths
forwarded submission

------------------------------

Date:         Fri, 20 May 88 08:12:00 EDT
Reply-To:     Virus Discussion List <VIRUS-L@LEHIIBM1>
Sender:       Virus Discussion List <VIRUS-L@LEHIIBM1>
From:         "Joseph M. Beckman" <Beckman@DOCKMASTER.ARPA>
Subject:      Re: Signature lengths
In-Reply-To:  Message of 16 May 88 14:37 EDT from
              "riacs!ames!hc!csed-1!csed-47!roskos%rutgers.edu at
              CUNYVM.CUNY.EDU"


The capability to limit what programs can write to executables, etc., is
a capability we are building into the LOCK (LOgical Coprocessing
Kernel).

This is done by assigning a "domain" to every subject (program) and a
"type" to every "object" (file).  There is an access matrix to determine
which domains have (a particular) access to types.  So if you have a
type called "executable", only a subject in domain "trusted compiler"
would have write access to it.

This is a very powerful integrity tool, which will allow us to make some
very strong assertions about how (if any) viruses could exist in such a
"LOCKed" system.

Joseph

--------------------

Date:         Fri, 20 May 88 08:46:35 EDT
Reply-To:     Virus Discussion List <VIRUS-L@LEHIIBM1>
Sender:       Virus Discussion List <VIRUS-L@LEHIIBM1>
From:         "Kenneth R. van Wyk" <LUKEN@LEHIIBM1>
Subject:      Re: Signature lengths
In-Reply-To:  Message of Fri,
              20 May 88 08:12:00 EDT from <Beckman@DOCKMASTER.ARPA>

>a capability we are building into the LOCK (LOgical Coprocessing
>Kernel).

Any chance of giving us VIRUS-L readers some more information on
LOCK?  I'm sure we'd all appreciate it.


Ken

- ----------------------------------------------------------------------
= Kenneth R. van Wyk                   =                               =
= User Services Senior Consultant      =   Shocked!  Shocked I am at   =
= Lehigh University Computing Center   =      this despicable act!     =
= Internet: <LUKEN@VAX1.CC.LEHIGH.EDU> =                               =
= BITNET:   <LUKEN@LEHIIBM1>           =                               =
- ----------------------------------------------------------------------

--------------------

Date:         Fri, 20 May 88 09:07:02 EDT
Reply-To:     Virus Discussion List <VIRUS-L@LEHIIBM1>
Sender:       Virus Discussion List <VIRUS-L@LEHIIBM1>
From:         "Kenneth R. van Wyk" <LUKEN@LEHIIBM1>
Subject:      forwarded submission


Here's a forwarded submission from J.D. Abolins:



Ooops, my apologies. I had gotten the name wrong for the fellow
who is looking for the copy of the RISKS LOG. I still don't have
a copy of the original message from here at this site, but I
think the name is more like Eric Roskos. But in any case, you
know who you are and the offer for the doskette applies to anyone
on the VIRUS-L list. (I prefer a stamped self-addressed disk mailer
with a diskette or money to cover the disk and mailing.)

Also I have sent up the DIRTY DOZEN listing, version 8 b. This
came out in April 1988.

J.D. Abolins

- ----------------------------------------------------------------------
= Kenneth R. van Wyk                   =                               =
= User Services Senior Consultant      =   Shocked!  Shocked I am at   =
= Lehigh University Computing Center   =      this despicable act!     =
= Internet: <LUKEN@VAX1.CC.LEHIGH.EDU> =                               =
= BITNET:   <LUKEN@LEHIIBM1>           =                               =
- ----------------------------------------------------------------------
