Paper1: Make software immune to observation and modification.
Tamper-resistance using Integrity Verification Kernels:
Threats:
breach communication access controls to attack the system;
computer virus;
attacker as insider: may modify at will.
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?