Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.

Slides:



Advertisements
Similar presentations
Computer Architecture
Advertisements

CS4315A. Berrached:CMS:UHD1 Operating Systems and Computer Organization Chapter 4.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
© 2004, D. J. Foreman 1 O/S Organization. © 2004, D. J. Foreman 2 Topics  Basic functions of an OS ■ Dev mgmt ■ Process & resource mgmt ■ Memory mgmt.
OS Fall ’ 02 Introduction Operating Systems Fall 2002.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Architectural Support for Operating Systems. Announcements Most office hours are finalized Assignments up every Wednesday, due next week CS 415 section.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
OS Spring’03 Introduction Operating Systems Spring 2003.
Abhinav Kamra Computer Science, Columbia University 2.1 Operating System Concepts Silberschatz, Galvin and Gagne  2002 Chapter 2: Computer-System Structures.
Chapter 7 Interupts DMA Channels Context Switching.
Midterm Tuesday October 23 Covers Chapters 3 through 6 - Buses, Clocks, Timing, Edge Triggering, Level Triggering - Cache Memory Systems - Internal Memory.
Figure 1.1 Interaction between applications and the operating system.
Computer System Structures memory memory controller disk controller disk controller printer controller printer controller tape-drive controller tape-drive.
1 Last Class: Introduction Operating system = interface between user & architecture Importance of OS OS history: Change is only constant User-level Applications.
Introduction Operating Systems’ Concepts and Structure Lecture 1 ~ Spring, 2008 ~ Spring, 2008TUCN. Operating Systems. Lecture 1.
OS Organization. OS Requirements Provide resource abstractions –Process abstraction of CPU/memory use Address space Concurrency Thread abstraction of.
1 OS & Computer Architecture Modern OS Functionality (brief review) Architecture Basics Hardware Support for OS Features.
Midterm Wednesday 11/19 Overview: 25% First Midterm material - Number/character representation and conversion, number arithmetic - DeMorgan’s Law, Combinational.
What do operating systems do? manage processes manage memory and computer resources provide security features execute user programs make solving user.
Chapter 17 Microprocessor Fundamentals William Kleitz Digital Electronics with VHDL, Quartus® II Version Copyright ©2006 by Pearson Education, Inc. Upper.
General System Architecture and I/O.  I/O devices and the CPU can execute concurrently.  Each device controller is in charge of a particular device.
hardware and operating systems basics.
Protection and the Kernel: Mode, Space, and Context.
Chapter 1. Introduction What is an Operating System? Mainframe Systems
G53SEC 1 Reference Monitors Enforcement of Access Control.
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
Contact Information Office: 225 Neville Hall Office Hours: Monday and Wednesday 12:00-1:00 and by appointment.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 2: Computer-System Structures Computer System Operation I/O Structure.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
1 Chapter 2: Computer-System Structures  Computer System Operation  I/O Structure  Storage Structure  Storage Hierarchy  Hardware Protection  General.
Lecture 3 Process Concepts. What is a Process? A process is the dynamic execution context of an executing program. Several processes may run concurrently,
Hardware process When the computer is powered up, it begins to execute fetch-execute cycle for the program that is stored in memory at the boot strap entry.
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection Network Structure.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Computer Organization - 1. INPUT PROCESS OUTPUT List different input devices Compare the use of voice recognition as opposed to the entry of data via.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Operating Systems Lecture November 2015© Copyright Virtual University of Pakistan 2 Agenda for Today Review of previous lecture Hardware (I/O, memory,
Computer Organization & Assembly Language © by DR. M. Amer.
Interrupt driven I/O. MIPS RISC Exception Mechanism The processor operates in The processor operates in user mode user mode kernel mode kernel mode Access.
We will focus on operating system concepts What does it do? How is it implemented? Apply to Windows, Linux, Unix, Solaris, Mac OS X. Will discuss differences.
Silberschatz, Galvin and Gagne  Applied Operating System Concepts Chapter 2: Computer-System Structures Computer System Architecture and Operation.
Computer Based Systems Stage 2 Information Technology Studies Computer & Communication Systems.
Interrupt driven I/O Computer Organization and Assembly Language: Module 12.
CS4315A. Berrached:CMS:UHD1 Operating Systems and Computer Organization Chapter 4.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
بسم الله الرحمن الرحيم MEMORY AND I/O.
1 Basic Processor Architecture. 2 Building Blocks of Processor Systems CPU.
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
Interrupts and Exception Handling. Execution We are quite aware of the Fetch, Execute process of the control unit of the CPU –Fetch and instruction as.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
CSCI/CMPE 4334 Operating Systems Review: Exam 1 1.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Introduction to Operating Systems Concepts
OPERATING SYSTEM CONCEPT AND PRACTISE
Chapter 2: Computer-System Structures
Chapter 1: Introduction
Introduction of microprocessor
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Computer-System Architecture
Module 2: Computer-System Structures
Components of a CPU AS Computing - F451.
Operating Systems Lecture 3.
Module 2: Computer-System Structures
Operating Systems: A Modern Perspective, Chapter 3
Chapter 2: Computer-System Structures
Chapter 2: Computer-System Structures
Module 2: Computer-System Structures
Module 2: Computer-System Structures
Presentation transcript:

Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses to objects by subjects. Security Kernel: The hardware, firmware, and software elements of a trusted computing base that implement the Reference Monitor concept. Trusted Computing Base (TCB): The totality of protection mechanisms within a computer system – including hardware, firmware – the combination of which is responsible for enforcing a security policy. Applications Services Operating system OS kernel Hardware Different layers in a computer system Computer System Security and Management Reference Monitors

Placing the Reference Monitor The reference monitor can be placed: In hardware: Access control to mechanisms in microprocessors. In the operating system: Access control in Linux. In the services layer: Access control in databases. In the application: In the application code. Operating system integrity The goal of an attacker is to disable the security control by modifying the operating system. When securing an operating system two requirements have to be addressed: Users should be able to use the operating system. Users should not be able to misuse the operating system. In Linux there is 2 modes: user mode: protected mode. supervisor mode: root mode. To execute a command in supervisor mode sudo can be used in Linux. Computer System Security and Management Reference Monitors

Hardware security features Hardware is the lowest layer in an IT architecture: Applications Services Operating system OS kernel Hardware Protection in the Security Kernel It may be possible to evaluate security to a higher level of assurance Putting security mechanisms into the core of the system increase the performance. No overheads caused by security checks. Access control decisions are removed from applications. Computer System Security and Management Reference Monitors

A brief overview of Computer Architecture I/O CPU Memory Bus CPU components: Registers: General purpose registers. Dedicated register. Program counter: Points to memory location that contains the next instruction to be executed. Stack pointe: Points to the top of the system stack. Status register: Allows the CPU to keep essential state information. Arithmetic Logic Unit (ALU): Executes instructions given in a machine level language or sets bits in the status register. To switch between different programs, the CPU perform a context switch and saves the state of the current process. Input devices: Keyboards Output devices: Monitor RAM (Random Access Memory): stores data temporarily. ROM (Read Only Memory): Store data permanently. EPROM (Erasable & Programmable Read Only Memory): The data can be erased or kept permanently. WROM (Write Once memory): Freeze the data once for all. Keep the OS or cryptographic keys on ROM or EPROM. RAM: volatile memory. ROM, EPROM, WROM: non-volatile memory. Computer System Security and Management Reference Monitors

Processes and Threads A process is a program in execution. A process is an important unit of control for the OS and for the security. A process consists of: Executable code. Data. The execution context. Processes communicate with each other through primitives provided by the OS, IPC. Less secure because of the context switch between processes. Expensive operation in the OS Treads are execute within a process. Share the process address space. More secure. Less expensive operation in the OS. Computer System Security and Management Reference Monitors

Interrupts (traps, exceptions) Interrupts are created by processes when: There is error in the program. User sends a request. Hardware failure. A trap is a special input to the CPU which includes an ad TRAP #n Interrupt vector Interrupt vector table contains addresses Interrupt handler Memory Process of an interrupt n10n10 Interrupt table has to be protected. Viruses can change an entry in the table so that it points to attack code. Redirecting pointer is a very efficient attack method. Computer System Security and Management Reference Monitors