January 2015
Intermediate to advanced
944 pages
33h 37m
English
In this chapter:
• Object protection: virtualization, sharing
• Memory protection: registers, paging, segmentation
• Design qualities: modularity, layering, kernelization
• Trusted systems: TCB, reference monitor, trusted path, object reuse, evaluation criteria
• Rootkits: power, design
In this chapter we explore the role of the operating system in security. Although operating systems are crucial for implementing separation and access control, they are not invulnerable, and therefore compromise of an operating system can lead to security failure. Furthermore, users’ objects can be commingled with code and data for applications and support routines, and operating systems are limited in their ability to separate and protect ...