Questions to discuss for the DoS Limiting paper. Discuss any one of the
issues listed below.
- Discuss what is the threat model assumed by the DoS limiting architecture paper. In other words, what attacks can it defend against, what is trusted and what is not, what does it assume that adversarial end-hosts can and cannot do?
- In TVA, request packets are used to obtain capabilities, but they themselves do not carry capabilities. Given this, attackers can potentially flood request packets at a destination and exhaust all of the capabilities that are to be handed out by the destination. How does TVA defend against the request flooding attack?
- Discuss the structure of capabilities in TVA. Pick some attack and show how that is thwarted by the way capabilities are structured in TVA.