Download presentation
Presentation is loading. Please wait.
Published byRosemary Caldwell Modified over 8 years ago
1
Security Architecture and Design Chapter 4 Part 2 Pages 319 to 357
2
Virtual Memory
4
Process Isolation Protects processes from each other. Encapsulated – no other process has access to another process’ internal code. Data Hiding – no other process knows how a process work Interact with another process through its API
5
Time Multiplexing
6
Name Distinction Process ID (PID)
7
RAM Dynamic Random Access Memory Millions of transistors and capacitors Capacitor stores 1 or 0 1 = several electrons stored in it Need to be read and rewritten regularly
8
Static RAM (SRAM) Does not require continuous refreshing Faster than DRAM More expensive and smaller capacity Used for Cache memory
9
Memory Management
10
Dynamic Link Libra (DLL) Crypt32.dll
11
Buffer Overflow
13
char buf[10]; gets(buff)
14
Memory Protection Techniques Windows “Address Space Layout Randomization” Randomly rearrange key data areas in memory – Starting address of function – Stack address – Libraries Prevents attackers guessing through trial and error
15
Prevent Buffer Overflow Use Java or C# Buffer = new char[10]; Buffer[20] causes an exception to be thrown
16
Memory Leak Languages like C++ Buffer = new int[100]; Delete(buffer); Can be used for a Denial of Service Attack (DoS) Java and C# have garbage collection
17
I/O Device Block devices – Disk – Transfers sectors Character devices – Printers, mouse – Stream of characters
18
I/O Handled by the OS device driver Communicates with the device controller
19
Interrupts OS schedules I/O I/O with Direct Memory Access Devices sends an interrupt when I/O is completed OS moved process from blocked to waiting OS schedules next I/O on device
20
CPU Architecture Figure page 343
21
Ring Architecture Figure 4-15 on page 344 OS Kernel – Communicates with I/O devices – Schedules processes – Handles interrupts Application Program Interface (API) Windows only uses Rings 0 and 3 Attack: replace DLL with malicious code
22
Operating System Architecture Monolithic – Figure 4-16 on page 347 Microkernel Architecture – Figure 4-18 on page 350 – Small kernel – Operating systems utilities are invoked in user mode
23
Virtual Machines Figure 4-21 on page 356 List on pages 356-7
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.