95-752:7-1 Operating System Features. 95-752:7-2 Operating System Features Memory protection Temporary file issues Dead space issues Sandboxing Object.

Slides:



Advertisements
Similar presentations
Part IV: Memory Management
Advertisements

Machine Independent Assembler Features
Chapter 15 Address Translation Chien-Chung Shen CIS, UD
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
CSC 405 Introduction to Computer Security
Chapter 11: File System Implementation
Day 20 Memory Management. Assumptions A process need not be stored as one contiguous block. The entire process must reside in main memory.
Memory Management Design & Implementation Segmentation Chapter 4.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Memory Organization.
Computer Organization and Architecture
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
SE571 Security in Computing
Operating System Chapter 7. Memory Management Lynn Choi School of Electrical Engineering.
Systems Security & Audit Operating Systems security.
Memory Management Chapter 7.
Chapter 5 Operating System Support. Outline Operating system - Objective and function - types of OS Scheduling - Long term scheduling - Medium term scheduling.
8.4 paging Paging is a memory-management scheme that permits the physical address space of a process to be non-contiguous. The basic method for implementation.
The Structure of Processes (Chap 6 in the book “The Design of the UNIX Operating System”)
By Teacher Asma Aleisa Year 1433 H.   Goals of memory management  To provide a convenient abstraction for programming  To allocate scarce memory resources.
Virtual Memory Expanding Memory Multiple Concurrent Processes.
1 Linux Operating System 許 富 皓. 2 Memory Addressing.
Paging Example What is the data corresponding to the logical address below:
Lecture 11 Page 1 CS 111 Online Memory Management: Paging and Virtual Memory CS 111 On-Line MS Program Operating Systems Peter Reiher.
Security in Operating Systems Cuiwei Zhao. Security in Operating System §Security breaches §Security goals §Protected objects of the general purpose operating.
PA0 due 60 hours. Lecture 4 Memory Management OSTEP Virtualization CPU: illusion of private CPU RAM: illusion of private memory Concurrency Persistence.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
By Teacher Asma Aleisa Year 1433 H.   Goals of memory management  To provide a convenient abstraction for programming.  To allocate scarce memory.
Operating Systems Lecture 14 Segments Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard. Zhiqing Liu School of Software Engineering.
Processes and Virtual Memory
CSE 351 Final Exam Review 1. The final exam will be comprehensive, but more heavily weighted towards material after the midterm We will do a few problems.
ICOM Noack Memory management Virtual memory Paging and segmentation Demand paging Memory management hardware.
Virtual Memory Pranav Shah CS147 - Sin Min Lee. Concept of Virtual Memory Purpose of Virtual Memory - to use hard disk as an extension of RAM. Personal.
Virtual Memory From course notes University of Waikato. Some material by Tony McGregor Other material from: The Architecture.
Memory Management. 2 How to create a process? On Unix systems, executable read by loader Compiler: generates one object file per source file Linker: combines.
Memory Management Chapter 5 Advanced Operating System.
W4118 Operating Systems Instructor: Junfeng Yang.
SECURITY IN COMPUTING BY PFLEEGER Operating Systems Security.
Computer Security: Chapter 5 Operating Systems Security.
File Systems and Disk Management
Non Contiguous Memory Allocation
CE 454 Computer Architecture
Segmentation COMP 755.
Memory Protection: Kernel and User Address Spaces
Outline Paging Swapping and demand paging Virtual memory.
COMBINED PAGING AND SEGMENTATION
Day 19 Memory Management.
143A: Principles of Operating Systems Lecture 5: Address translation
CSI 400/500 Operating Systems Spring 2009
Paging and Segmentation
Operating Systems Security
Memory Protection: Kernel and User Address Spaces
Memory Protection: Kernel and User Address Spaces
Lecture 14 Virtual Memory and the Alpha Memory Hierarchy
Memory Management 11/17/2018 A. Berrached:CS4315:UHD.
Practice Six Chapter Eight.
Segmentation Lecture November 2018.
Main Memory Background Swapping Contiguous Allocation Paging
File Systems and Disk Management
Main Memory Session - 16.
Lecture 3: Main Memory.
File Systems and Disk Management
Operating System Chapter 7. Memory Management
Virtual Memory Overcoming main memory size limitation
File Systems and Disk Management
Lecture 35 Syed Mansoor Sarwar
COMP755 Advanced Operating Systems
Page Main Memory.
Presentation transcript:

95-752:7-1 Operating System Features

95-752:7-2 Operating System Features Memory protection Temporary file issues Dead space issues Sandboxing Object Request Brokers

95-752:7-3 Separation Physical – processes use different physical objects Temporal – processes use same objects at different times Logical – processes use objects in constrained space Cryptographic – processes use only intelligible objects

95-752:7-4 Levels of Protection None Isolation Share all/Share none Share via access limitation Share by capabilities Limited use

95-752:7-5 Granularity Volume (physical storage structure) Data collection (file, database, memory) Data element (entry, memory structure) Field (value within data element) Word (addressable memory unit) Byte (character) Bit (1/0) Detail vs. Efficiency

95-752:7-6 Mechanisms Fence Register Relocation Base/Bounds Register Tagged Architecture Segmentation Paging Paged Segmentation Capability

95-752:7-7 Fence Register Address bounding protected and open memory –Protected, typically operating system –Open, typically user No protection within bounds Operating System User Program Space Fence Max 8193

95-752:7-8 Relocation Need to shift programs in memory Programs written using memory 0 and above Operating system translates to actual location Retranslate to shift program in memory Operating System Program A (old) Program A (new)

95-752:7-9 Base/Bounds Register Starting address for program – base register Max allocated address – bounds register Changed at context switch Operating System Program A Program B Base Bound

95-752:7-10 Tagged Architecture Each word of memory has identified access rights Rights tested on each access Typically few distinctions –Data –Pointer –Control D0001D0002D0003P8192CLoad ACAdd BCStore CP16384D0004D0005D0006P10572

95-752:7-11 Segmentation Program pieces –Instructions –Data –Constants Access Store separately –Base –bound Protect differently Allow sharing External fragmentation Operating System Program B Data Program Instructions Program A Data Program Constants A Table Data Inst. Con. B Table Data Inst. Con. rw x r wx r

95-752:7-12 Paging Equal-size blocks Access Offset > size goes to next page Difficult to protect Less fragmentation Difficult to share a b g d e f h c i j Page table 0f1b2j3e j+53

95-752:7-13 Paged Segmentation Segment references translate to page references – –, > Segmentation for sharing/protection Paging for ease of handling

95-752:7-14 Capabilities Unforgeable token –Identity of object requested –Rights to object –Signature of broker Control of rights transfer Control of rights propagation Done at structure level

95-752:7-15 Temporary File Issues Temporary file – duration for life of process only Intended private and non-invasive Threats –Disclosure –Modification –Misdirection Protection via atomic transactions

95-752:7-16 Dead Space Issues What are default values? –Random –Zero –Whatever was there before What are cleared values? –Random –Zero –Pattern –No clearing

95-752:7-17 Sandboxing Restricted environment for untrusted code –Web code – code –Issues of completeness, operations available Alternative: trust vendor signature(ActiveX) Alternative: carry proof (lab systems) Alternative: cryptography (Microsoft)

95-752:7-18 Object Request Brokers Object – code and data bundle, limited access methods Broker – mediate communication between objects CORBA – industry standard Still a lot of discussion about protection