Self and Non-Self in UNIX
Feb 16, 1996
AbstractToday's seminar will be a brief and informal introduction to the ideas behind self and non-self in computing. Don't worry - this won't be a lecture on philosophy! I will concentrate on how can a notion of "self" for a UNIX process be developed, and how can this be used to detect changes (i.e. "non-self"). Detecting changes is useful in locating misuse attacks and anomalous conditions.
This work was developed at the University of New Mexico under Stephanie Forrest. This presentation is based on my trip out there last weekend
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.