Discussion Questions for Week 3: 1. The security researcher Joanna Rutkowska wrote the following in a blog post (http://theinvisiblethings.blogspot.com/2007/08/tricky-tricks.html): "...the [Antivirus] industry...invested zillions of dollars into research on polymorphic virus detection, built advanced emulators for analysis of infected files, etc. The outcome – lots of complex heuristics that usually work quite well against known patterns of infection, but are often useless against new 0day engines and also are so complex that nobody really knows how many false positives they can produce and how buggy the code itself is...So, do I want to say that all those years of A/V research on detecting file infections was a waste time[sic]? I’m afraid that is exactly what I want to say here. This is an example of how the security industry took a wrong path, the path that never could lead to an effective and elegant solution. This is an example of how people decided to employ tricks, instead looking for generic, simple and robust solutions." Discuss. 2. How are the file access control mechanisms on Unix/Linux or Windows (your choice) related to the access control matrix model?