You are to turn in this homework during lecture. Please
write up your answers to the exercises below and hand them in to a
6.828 staff member at the beginning of lecture.
Backtracking Intrusions
This paper describes a dependency-tracking approach to determining the
steps that were involved in an intrusion.
Submit:
Describe one way an attacker could elude BackTracker.