Lecture 4 Operating Systems Security
Lecture 4 Operating Systems Security
In collaboration with:
Deborah Frincke, Ph.D.
Director, Center for Secure and Dependable
Systems
University of Idaho
Text Book
Both broad survey and focused
Chapters 1-2 lay groundwork
Chapters 3 –7 Software
• Chapter 4
– Protection Features of General OS
• Protecting memories
• Protecting files
• Protecting execution environment
– Controlled access to objects
– User authentication
Chapter 8 Management
Chapter 9 Privacy, ethics, the law
Chapter 10 Cryptography – the how
In this section of the course we
will look at…
R 0001
RW 0137
R 4091
R= Read only
R 0002 RW = Read/Write
X
X = Execute only
OS maintains segment
address table
(name, offset)
Efficiency (overhead)
• OS lookup slow
• Segment names difficult to encode
OS maintains page
translation table
(page, offset)
No unity to page
Directory
Access Control List
Access Control Matrix
Capability
Procedure-Oriented Access Control
Efficiency penalty