Reports and Papers Archive
History of Computer Security Project Early Papers (part I)
A Simple Active Attack Against TCP
This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password[SKEY] or by ticketing authentication [Kerberos]. The TCP COnnection is vulnerable to anyone with a TCP packet sniffer and generator locates on the path followed by the connection. Some schemes to detect this attack are presented as well as some methods of prevention and some interesting details of the TCP protocol behaviors.
Critical Foundations: Protecting America's Infrastructure 1998
SKIPJACK and KEA Algorithm Specifications
A Bibliography on Performance Issues in ATM Networks
The Asychronous Transfer Mode (ATM) is the transport mode of choice for B-ISDN. In order for high speed networks to become a reality, a number of performance issues has to be resolved.
An Overview of InterBase Systems
Distributed, heterogeneous, and autonomous hardware and software systems are the product of legnthy and diverse computational and information processing requirements. The introduction of harmonious cooperation among such systems carries the potential for great increases in productivity and improvment in applications processing. However, such harmonious cooperation must be supportedby an integrated system that would allow the developement of global applications.
Intelligence Requirements for Information Warfare
Network Security Tools
An Introduction to Software Architecture
As the size of system software increases, the algorithms and data structures of the computation no longer constitute the major design problems. When systema are constructed from many components, the organization of the overall system - the software architecture - presents a new set of dsign problems. This level of design has been address a number of ways including informal diagrams and descriptive terms, module interconnection languages, templates and frmeworks for systems that serve the needs of specific domains, and formal models of component integration mechanisms.
Task Communication in DEMOS
This paper describes the fundamentals and some of the details of task commincation in DEMCS, the operating system for the CRAY-1 computer being developed at the Los Alamos Scientific Laboratory. The communication mech- anism is a message system with several novel features. Meesages are sent from one task to another over links. Links are the primary protected objects in the system; they provide messages paths and optional data sharing between tasks. They can be used to represent other objects with capability-like ac- cess controls. Links point to the tasks that created them. A task that creates a link determines its contents and possibly restricts its use. A link may be passed on from on task to another along with a message sent over some other link suject to the restrictions imposed by the creatorof the link be- ing passed. The link based message and sata sharing system is an attractive alternative to semaphore or monitor type shared variable based operating system on machines with only very simple memory protection mechanisms or on machines connected together in a network.
The DEMCS File System
This paper discussesthe design of the file system for DEMCS, an operating system being developed for the CRAY-1 somputer at Los Alamos Scientific Laboratory. The goals to be met, in particular the performance and usability considerations are outlined. A descriptionis given of the user interface and the general structure of the file systemand the file system routines. A simple model of program behavior is used to demonstrate the effet of buffer- ing data by the file system routines. A disk space allocation strategy is descibed which will take advantage of this buffering. The last section out- lines how the performance mechanisms are itegrated into the file system routines.

