…no, not this post, silly, THIS:
For example, a popular form of sabotage is to issue certain
data-returning supervisor calls (e.g., "what time is it?" request)
providing an Invalid address as a parameter. The operating system, running with
protection disabled and assuming that the address parameter corresponds to a
user’s data area, transfers the return data to that location. If the address
provided actually corresponds to locations within the operating system, the
system can be made to destroy or disable itself.
What YEAR was this written? Any guesses?
Update: This paragraph comes from:
Madnick,
Donovan – AN APPROACH TO INFORMATION SYSTEM ISOLATION AND SECURITY IN A SHARED
FACILITY, 1973
This is a pretty interesting paper if you are evaluating virtualization security. Isolation is one of the main points and this paper highlights isolation benefits when you are coming from a shared resource environment.
Andreas – excellent guess, only two years off.
1975.
32 years since then…
Hmmmm…
I found the given text in
http://web.mit.edu/smadnick/www/papers/J007.pdf
“Hierarchical approach to computer system integrity”
which is “dated” as of 1975. Page “193/194″ (or 6&7 in the PDF).
Yes, it lists the paper of 1973 in the references (No. 26) but in the text itself there is no citation mark…
Anyway – a reeeeeeeaallllyyy old quotation for a brand hot topic