Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Architecture and Design Chapter 4 Part 2 Pages 319 to 357.

Similar presentations


Presentation on theme: "Security Architecture and Design Chapter 4 Part 2 Pages 319 to 357."— Presentation transcript:

1 Security Architecture and Design Chapter 4 Part 2 Pages 319 to 357

2 Virtual Memory

3

4 Process Isolation Protects processes from each other. Encapsulated – no other process has access to another process’ internal code. Data Hiding – no other process knows how a process work Interact with another process through its API

5 Time Multiplexing

6 Name Distinction Process ID (PID)

7 RAM Dynamic Random Access Memory Millions of transistors and capacitors Capacitor stores 1 or 0 1 = several electrons stored in it Need to be read and rewritten regularly

8 Static RAM (SRAM) Does not require continuous refreshing Faster than DRAM More expensive and smaller capacity Used for Cache memory

9 Memory Management

10 Dynamic Link Libra (DLL) Crypt32.dll

11 Buffer Overflow

12

13 char buf[10]; gets(buff)

14 Memory Protection Techniques Windows “Address Space Layout Randomization” Randomly rearrange key data areas in memory – Starting address of function – Stack address – Libraries Prevents attackers guessing through trial and error

15 Prevent Buffer Overflow Use Java or C# Buffer = new char[10]; Buffer[20] causes an exception to be thrown

16 Memory Leak Languages like C++ Buffer = new int[100]; Delete(buffer); Can be used for a Denial of Service Attack (DoS) Java and C# have garbage collection

17 I/O Device Block devices – Disk – Transfers sectors Character devices – Printers, mouse – Stream of characters

18 I/O Handled by the OS device driver Communicates with the device controller

19 Interrupts OS schedules I/O I/O with Direct Memory Access Devices sends an interrupt when I/O is completed OS moved process from blocked to waiting OS schedules next I/O on device

20 CPU Architecture Figure page 343

21 Ring Architecture Figure 4-15 on page 344 OS Kernel – Communicates with I/O devices – Schedules processes – Handles interrupts Application Program Interface (API) Windows only uses Rings 0 and 3 Attack: replace DLL with malicious code

22 Operating System Architecture Monolithic – Figure 4-16 on page 347 Microkernel Architecture – Figure 4-18 on page 350 – Small kernel – Operating systems utilities are invoked in user mode

23 Virtual Machines Figure 4-21 on page 356 List on pages 356-7


Download ppt "Security Architecture and Design Chapter 4 Part 2 Pages 319 to 357."

Similar presentations


Ads by Google