1995-10-12 - Follow-up to sci.crypt posting that prompted NYT article

Header Data

From: rubin@faline.bellcore.com (Aviel D Rubin)
To: cypherpunks@toad.com
Message Hash: a3bc7f1ccc08282f4484e362ee164d0feebb8483fbd7e09fc7f30adaaff65f0f
Message ID: <199510121305.JAA27503@faline.bellcore.com>
Reply To: N/A
UTC Datetime: 1995-10-12 13:06:02 UTC
Raw Date: Thu, 12 Oct 95 06:06:02 PDT

Raw message

From: rubin@faline.bellcore.com (Aviel D Rubin)
Date: Thu, 12 Oct 95 06:06:02 PDT
To: cypherpunks@toad.com
Subject: Follow-up to sci.crypt posting that prompted NYT article
Message-ID: <199510121305.JAA27503@faline.bellcore.com>
MIME-Version: 1.0
Content-Type: text/plain


Yesterday, a New York Times article cited a posting by several
graduate students at Berkeley about the insecurity of the Internet.

We found the sci.crypt posting very interesting and relevant because we 
spent a good portion of the summer working to address the same problem.
Namely, detection of the malicious (or other) modification 
of an executable in transit over an untrusted network. In particular,
we believe that our system could be used to solve the NFS problem
mentioned in the posting from Berkeley.

Our paper can be accessed at

   ftp://thumper.bellcore.com/pub/rubin/stretch.ps

Avi Rubin <rubin@bellcore.com>
Trent Jaeger <jaegert@eecs.umich.edu>





Thread