Operating Systems Definition
Hardware: I/o…Memory….CPU
Operating Systems: Windows or Android, etc
Applications run on operating system
Operating Systems’ uses
TCB
trusted computing base/kernel
TCB (trusted computing base) Requirements
OS controls access to protected resources by?
- Establish the source of the request (authentication - who?)
- Authorization or access control does the source of the request have the right to access the resource.
- The OS follows the policies for authorization and authentication
claim that 1 OS is more secure is based on
it’s less likely to be a target
what is a system call?
why does system call have higher cost?
How can we trust OS?
- processor execution modes/rings (system & user)
what is system call instruction in x86
sysenter/sysexit
how to achieve untrusted user code isolation?
hardware support
how do hackers access to OS secure memory?
- refresh mechanism of a dynamic ram
address space
process views memory as
memory process
- isolate physical addrs that are accessible by process A to physical addrs that are accessible by process B
page table
process data/code protection
OS will not map a logical page of process A to a physical page of process B unless explicit sharing is desired.
use of processor memory management unit (MMU)
how does TCB ensure complete mediation?
how does the OS ensure complete mediation?
how does virtualization limit the damage of a hacked OS?
how does TCB ensure correctness?
- secure coding with type safe language