From: rubin@faline.bellcore.com (Aviel D Rubin)
To: cypherpunks@toad.com
Message Hash: a3bc7f1ccc08282f4484e362ee164d0feebb8483fbd7e09fc7f30adaaff65f0f
Message ID: <199510121305.JAA27503@faline.bellcore.com>
Reply To: N/A
UTC Datetime: 1995-10-12 13:06:02 UTC
Raw Date: Thu, 12 Oct 95 06:06:02 PDT
From: rubin@faline.bellcore.com (Aviel D Rubin)
Date: Thu, 12 Oct 95 06:06:02 PDT
To: cypherpunks@toad.com
Subject: Follow-up to sci.crypt posting that prompted NYT article
Message-ID: <199510121305.JAA27503@faline.bellcore.com>
MIME-Version: 1.0
Content-Type: text/plain
Yesterday, a New York Times article cited a posting by several
graduate students at Berkeley about the insecurity of the Internet.
We found the sci.crypt posting very interesting and relevant because we
spent a good portion of the summer working to address the same problem.
Namely, detection of the malicious (or other) modification
of an executable in transit over an untrusted network. In particular,
we believe that our system could be used to solve the NFS problem
mentioned in the posting from Berkeley.
Our paper can be accessed at
ftp://thumper.bellcore.com/pub/rubin/stretch.ps
Avi Rubin <rubin@bellcore.com>
Trent Jaeger <jaegert@eecs.umich.edu>
Return to October 1995
Return to “rubin@faline.bellcore.com (Aviel D Rubin)”
1995-10-12 (Thu, 12 Oct 95 06:06:02 PDT) - Follow-up to sci.crypt posting that prompted NYT article - rubin@faline.bellcore.com (Aviel D Rubin)