Operating System Security Basics

Operating System Security Basics

Computer Security CS 426 Lecture 7 Operating System Security Basics CS426 Fall 2010/Lecture 7 1 Announcements • Hk1Homework 1 due on St10Sept 10 • Will have first quiz near the end of lecture • Form a two-person team for the projects, and send team member info and preferred login for the team to the TA CS426 Fall 2010/Lecture 7 2 Comppyuter System Com ponents • Hardware – Provides basic computing resources (CPU, memory, I/O devices) . • Operating system – Controls and coordinates the use of the hardware among the various application programs. • Applications p rog rams – Define the ways in which the system resources are used to solve the computing problems of the users. • Users – E.g., people, machines, other computers. CS426 Fall 2010/Lecture 7 3 Abstract View of System Components CS426 Fall 2010/Lecture 7 4 What Security Goals Does Operating System Provide? • Goal 1: enabling multiple users securely share a computer – Separation and sharing of processes , memory, files, devices, etc. • What do C, I, A, mean here? • What is the threat model? • How to achieve the security goals? – Memory protection – Processor modes – User authentication – File access control CS426 Fall 2010/Lecture 7 5 What Security Goals Does Operating System Provide? • Goal 2: ensure secure operation in networked environment • What do C, I, A mean here? • What is the threat model? • How to achieve the security goals? – Authentication – Access Control – Secure Communication (using cryptography) – Logging & Auditing – Intrusion Prevention and Detection – Recovery CS426 Fall 2010/Lecture 7 6 Security is About Controlled Sharing • EtiEnsure separation – Physical – Temporal – Logical – Cryptographical • OS also need to ensure sharing • Reconcile sharing and separation CS426 Fall 2010/Lecture 7 7 Memory Protection: access control to memory • Ensures that one user’ s process cannot access other’s memory – fence – relocation – base/bounds register – segmentation – ppgagin g –… • Opera ting sys te m a nd use r pr ocesses n eed t o have different privileges CS426 Fall 2010/Lecture 7 8 CPU Modes (a.k.a. processor modes or privilege • StSystem mod d(iilde (privileged mo de, mas ter mo de, supervisor mode, kernel mode) – Can execute any instruction – Can access any memory locations, e.g., accessing hdhardware dev ices, – Can enable and disable interrupts, – ChCan change priilivilege d processor s tttate, – Can access memory management units, – CdifCan modify regitisters for vari ous descr itiptor tbltables . Reading: http://en. wikipedia.org/wiki/CPU _modes CS426 Fall 2010/Lecture 7 9 User Mode • User mode – Access to memory is limited, – Cannot execute some instructions – Cannot disable interrupts, – Cannot change arbitrary processor state, – Cannot access memory management units • Transition from user mode to system mode must be done through well defined call gates (system calls) Reading: http://en. wikipedia.org/wiki/CPU _modes CS426 Fall 2010/Lecture 7 10 System Calls • Guarded gates from user mode (space, land) into kernel mode (space, land) – use a special CPU instruction (often an interruption) , transfers control to predefined entry point in more privileged code; allows the more privileged code to specify where it will be entered as well as important processor state at the time of entry. – the higher privileged code, by examining processor state set by the less privileged code and/or its stack, determines what is being requested and whether to allow it. http://en. wikipedia.org/wiki/System _ call CS426 Fall 2010/Lecture 7 11 Kernel spppace vs User space • PtfthOSPart of the OS runs i ithkn the kernel mod dlel – known as the OS kernel • Other parts of the OS run in the user mode, including service programs (daemon programs), user applications, etc. – they run as processes – they form the user space (or the user land) • Difference between kernel mode and processes running as root (or superuser, administrator) CS426 Fall 2010/Lecture 7 12 High-level View of Kernel Space vs. User Space Process 1 Process 2 Process n The Kernel Hardware (disks, network interfaces, etc.) CS426 Fall 2010/Lecture 7 13 Readings for This Lecture • Wikipedia • CPU modes • StSystem call CS426 Fall 2010/Lecture 7 14 Coming Attractions … • User Au then tica tion CS426 Fall 2010/Lecture 7 15.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us