A Multi-OS Approach to Trusted Computer System Yoshiura H., Miyazaki K., Itoh S., Takaragi K., Sasaki R. Security Protocols. 9th International Workshop.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

A graphical user interface (GUI) is a human-computer interface (i.e., a way for humans to interact with computers) that uses windows, icons and menus.
New Supervisor: Skills for Success
Experience Building and Supporting Secure Ad Hoc Collaborations Deb Agarwal Lawrence Berkeley National Laboratory Ad Hoc Collaboration - Internet2 Fall.
New Direction for Software Protection in Embedded Systems Department of EECS University of Michigan Feb 22, 2007 Kang G. Shin.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Chapter 14: Usability testing and field studies. 2 FJK User-Centered Design and Development Instructor: Franz J. Kurfess Computer Science Dept.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Database Design concepts INFO 1408 Lecture 3 What is a database?
1 Privacy Enhancing Technologies Elaine Shi Lecture 4 Principles of System Security slides partially borrowed from Jonathan Katz.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Cloud Usability Framework
Types of Operating Systems
Lecturer: Miljen Matijašević G10, room 6, Tue 11:30-12:30 Session 3, 31 Mar 2014.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Intranet, Extranet, Firewall. Intranet and Extranet.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
David N. Wozei Systems Administrator, IT Auditor.
HNDComputing – DeMontfort University  DeMontfort University 2011 Database Fundamentals wk2 Database Design ConceptsDatabase Design Concepts Database Design.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
A Unifying Approach to the Design of a Secure Database Operating System Written By: David L. Spooner Ehud Gudes.
Module 1.3 Database Management Systems. Outline 1. Data, System, Management 2. The Database Management System Environment 3. The DBMS Organizational Relationship.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
A grassroots demonstration by Nokwanda Mbusi. Features  A method of communication with students.  Allows interaction between lecturer and students and.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Going Green Initiatives in AP Computer Science A (Mr. Smith’s Classroom)
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
Introducing Software Computer Concepts Unit A. Introducing Software What is an Operating System? OS is the master controller for all the activities that.
Security Vulnerabilities in A Virtual Environment
1 CA203 Presentation Application Reviewing and Sharing a Presentation Lecture # 11.
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
My audience will be excited to learn the basics of what a network systems & data communications analyst does.
Secure Operating Systems Lesson F: Capability Based Systems.
1 3 Computing System Fundamentals 3.3 Computer Systems.
Introduction to OOP CPS235: Introduction.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Science Feature Articles. Put your angle to the test Choose the top two angles that you think would work for your science topic. Choose the top two angles.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Evolving Security in WLCG Ian Collier, STFC Rutherford Appleton Laboratory Group info (if required) 1 st February 2016, WLCG Workshop Lisbon.
CSC 351 FUNDAMENTALS OF DATABASE SYSTEMS. LECTURE 1: INTRODUCTION TO DATABASES.
User Interface Evaluation Introduction Lecture #15.
My top 3 careers clusters My top 3 careers are health science, Government and public administration, and Education + training.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Solaris 가상화 기술 이강산. What is a zone? A zone is a virtual operating system abstraction that provides a protected environment in which applications run.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Product Training 1 JetFlash Software Application.
CHALONER MIDDLE SCHOOL ELA EVAAS REPORTS and PLANS FOR IMPROVEMENT BY CECILYA WILLIAMS.
CONTROL-M Training At Global Online Trainings IND: Skype: Global.onlinetrainings USA:
Computer Security: Chapter 5 Operating Systems Security.
Lecturer: Miljen Matijašević G10, room 6, Wed 11:00-12:00 Session 3.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Securing Network Servers
Command Line Basics.
Backdoor Attacks.
Operating System.
A Multi-OS Approach to Trusted Computer Systems
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
A BRIEF INTRODUCTION TO UNIX OPERATING SYSTEM
By Dunlap, King, Cinar, Basrai, Chen
O.S Lecture 13 Virtual Memory.
Successful Science Projects
Chapter 1 Introduction to Operating System Part 2
Operating System Introduction.
System analysis and design
Associate Cloud Engineer Dumps PDF
Presentation transcript:

A Multi-OS Approach to Trusted Computer System Yoshiura H., Miyazaki K., Itoh S., Takaragi K., Sasaki R. Security Protocols. 9th International Workshop. Revised Papers (Lecture Notes in Computer Science Vol.2467). Springer-Verlag. 2002, pp Berlin, Germany Systems Development Laboratory Hitachi Ltd., Yokohama, Japan Presentation By: Akhil Mehra

Systems Objectives Build a trusted system that utilizes the security features of a Trusted OS to secure a User OS without compromising the User OS’s usability. Goals of the Proposed System Convenient User friendly OS Latest Technology User is able to take advantage of latest applications that run on ordinary OS Cost Effective Audience – Private Sector ( Banking, Insurance)

Appreciation Isolates Security related tasks from normal user related tasks Ability to independently design and develop the User OS and the Administrative OS The User OS can be easily modified without affecting the systems ability to enforce security. Security features can be easily added without affecting the User OS.

Critical Comment Security Boundary/Perimeter of the proposed system is unclear. Will the system monitor all processes in the User OS? Concerned with the security of each individual process. Limit access between process. Will the system monitor the User OS as a whole? Only concerned with data that flows in and out of the Operating System. Operating System treated as one big process to be monitored.

Critical Comment Continued The Basic Idea: “The user’s daily application programs run on the user OS, and the monitoring process assuring the security of the user OS runs on the monitoring OS.”

Critical Comment Continued Example System- File Management Process when accessed activates MOC File Management Process has to be modified to activate the MOC In my opinion can only be done for OS related process.

Question In the proposed system would it be enough to monitor user operating system as a whole (one big process) or does one need to monitor a number of applications running on inside the user OS?