We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMarc Reville
Modified about 1 year ago
© DEEDS – OS Systems & Software Dependability
© DEEDS – OS Outline for today Peek at OS2 topics Some DEEDS research introduction 1.Efficient Model Checking of Fault-tolerant Distributed Algorithms 2.OS testing & hardening 3.Dissecting AUTOSAR - Inside future automotive software
© DEEDS – OS OS testing & hardening
© DEEDS – OS OSs are large & complex beasts! Windows versionSLOC NT Million NT Million NT Million NT Million Win2k Million WinXP Million Server Million
© DEEDS – OS OSs are large & complex beasts! Linux kernelSLOC Million Million Million Million Million Million >15 Million And that‘s just the kernel... Debian Lenny „code base“: 54 Million SLOC Debian Lenny total: 324 Million SLOC
© DEEDS – OS Where are the bugs (2001)?
© DEEDS – OS Where are the bugs (10 years later)?
© DEEDS – OS Why are the bugs where they are? Sources of outage in Windows XP Sources of outage in Windows 2k Device drivers –Numerous: 250 installed (100 active) drivers in XP/Vista –Large & complex: 70% of Linux code base –Immature: every day 25 new / 100 revised versions Vista drivers –Access Rights: kernel mode operation in monolithic OSs Device drivers are the dominant cause of OS failures despite sustained testing efforts
© DEEDS – OS What can we do about the bugs? Detect upfront (static analyses, testing: white vs black box) Detect & recover at runtime (Sandboxing, e.g. Nooks, BGI) Nothing? make kernels robust!
© DEEDS – OS Two sample approaches Problem statement: Driver failures lead to OS API failures Mitigation approaches 1.Improve driver reliability 2.Harden OS robustness
© DEEDS – OS Some terminology
© DEEDS – OS A different view The problem in terms of error propagation The effect of testing in terms of error propagation The effect of robustness hardening in terms of error propagation
© DEEDS – OS Issues with the testing approach What if the driver is not the root cause? What if we cannot remove defects (e.g. commercial OSs)?
© DEEDS – OS Issues with the hardening approach What if we cannot remove robustness vulnerabilities?
© DEEDS – OS DEEDS: Driver testing Total State Space Operational State Space Testing
© DEEDS – OS DEEDS: Kernel hardening Test App OS Drivers Target Driver Manager Interceptor Drivers Host
SeETL The Worlds Most Productive ETL Tool 1/1/2012
Nooks: Safe Device Drivers with Lightweight Kernel Protection Domains Mike Swift, Steve Martin Hank Levy, Susan Eggers, Brian Bershad University of Washington.
CYPRESS Software Testing By Rick Clements
Linux Re-Visited A new look at the Linux Operating System.
Operating System Security Qiwen Pan and Hailei Jiang.
OS Components and Structure Hank Levy. OS Structure l To understand an OS, let’s first look at its components and then how they’re composed or organized.
Stacking it Up Experimental Observations on the operation of Dual Stack Services in todays Network Geoff Huston APNIC R&D February
WHAT IS AN OPERATING SYSTEM? IS IT SOFTWARE? Operating system.
UnixForum Chicago - March 8, 2001 Daniel P. Bovet University of Rome "Tor Vergata" INSIDE THE LINUX KERNEL.
SWE 681 / ISA 681 Secure Software Design & Programming Lecture 1: Introduction Dr. David A. Wheeler
Dr. Christian Vecchiola Postdoctoral Research Fellow Cloud Computing and Distributed Systems (CLOUDS) Lab Dept. of Computer Science.
Stacking it Up Experimental Observations on the operation of Dual Stack Services Geoff Huston IETF-80 March
Why NOT Electronic Document Handling? Chip Milosch Griffin Computing, Inc.
AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
MapuSoft Technologies Presentation OS Abstractor, OS Changer, OS PAL and MapuSoft are registered trademarks of MapuSoft Technologies Inc. All other trademarks.
CHESS : Systematic Testing of Concurrent Programs Madan Musuvathi Shaz Qadeer Microsoft Research.
1 A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities Shuo Chen, John Dunagan, Chad Verbowski and Yi-Min Wang NDSS 2005,
© 2006, Monash University, Australia CSE4884 Network Design and Management Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture Reliability Theory.
Experiences With Internet Traffic Measurement and Analysis Vern Paxson ICSI Center for Internet Research International Computer Science Institute and Lawrence.
Lecture 8: Testing, Verification and Validation Dr Valentina Plekhanova University of Sunderland, UK.
Online Counseling Resource YCMOU ELearning Drive… School of Architecture, Science and Technology Yashwantrao Chavan Maharashtra Open University, Nashik.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
GENI Distributed Services Preliminary Requirements and Design Tom Anderson and Amin Vahdat (co-chairs) David Andersen, Mic Bowman, Frans Kaashoek, Arvind.
State of Mobile Linux Juha-Matti Liukkonen, Jan 5,
On the Design of a Web Browser: Lessons learned from Operating Systems Kapil Singh and Wenke Lee Georgia Institute of Technology Web 2.0 Security and Privacy.
Shouldnt High-Performance Networks Be As Easy To Use As the Web? Basil Irwin Senior Network Engineer NETS July 13, 1999 National Center for Atmospheric.
NewArch: Future Generation Internet Architecture Project Bob BradenUSC ISI J. Noel Chiappa SE Virginia Museum of Asian Art Dave ClarkMIT LCS Mark HandleyACIRI.
Oracle Linux July The following is intended to outline our general product direction. It is intended for information purposes only, and may not.
R Validation for Life Sciences Validating R for Regulated Purposes 29th July 2010 Charles Roosen (Mango Solutions) - Introduction Andrew Ellis (ETH Zurich)
© 2016 SlidePlayer.com Inc. All rights reserved.