Instructions: By Tuesday, 10:00 AM, send email to the course staff email
alias (which is available on the home page) in which you:
- Answer the question below.
- Pose an additional question about the paper that articulates what you found
most confusing, least specified, etc.
Question. Assume that OKWS is deployed and that its approach to
separation is implemented correctly. Assume that pubd has a
vulnerability and that an attacker exploits that vulnerability. (1) Give an example
of damage that can be done by such an attacker. (2) Give an example
of something that such an attacker cannot do;
your example should be something that
such an attacker could have done, if all of OKWS's logic were
executing in a single process.