Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security - 2

Similar presentations


Presentation on theme: "Information Security - 2"— Presentation transcript:

1 Information Security - 2
Topic: Architectural Aid to Secure Systems Engineering V. Kamakoti RISE LAB, Department of Computer Science and Engineering IIT Madras Session – 10: X86 PROTECTED MODE details

2

3 Protected Mode Addressing
Logical Address SELECTOR OFFSET Descriptor Table Base Address Segment Descriptor Linear Address

4 A stack should not overgrow into adjoining segments
A process always executes from Code segment. It should not execute by accessing from adjoining Data or stack area or any other code area too. A stack should not overgrow into adjoining segments 500 Every segment is specified a start address and limit. Architecture checks if limit is not exceeded. CS 1000 ES 1500 SS 2000 POP EAX //Let SP be 2, Violation!!! PUSH EAX //Let SP be 498, violation POP AX //Let SP be 2, it is fine PUSH AX //Let SP be 498, it is fine mov [ES:498], AX //This is fine jmp CS:250 //This is fine jmp CS:501 //This is a violation as limit is 500 mov [ES:498], EAX //This is a violation!!! Intra and Inter process Protection

5 Interprocess Protection
Process 1 should be prevented from loading CS, such that it can access the code of Process 2 Similarly for the DS,SS, ES, FS and GS Privilege levels: [0-3] assigned to each segment. 0: Highest privilege 3: Lowest privilege Process 1 CS CS Process 1 DS Process 2 CS DS Process 2 SS SS Process 2 DS Process 1 SS Interprocess Protection

6 Privilege levels and Protection
Every segment has an associated privilege level and hence any code segment will have an associated privilege level. The CPL (Current Privilege Level) of a process is the privilege level of the code segment, the code stored in which, it is executing. A process can access segments that have privilege levels numerically greater than or equal to (less privileged than) its CPL.

7 End of Session-10 Thank You


Download ppt "Information Security - 2"

Similar presentations


Ads by Google