PPT-Ensuring Operating System Kernel Integrity with
Author : marina-yarberry | Published Date : 2016-04-06
Osck Owen Hofmann Alan Dunn Sangman Kim Indrajit Roy Emmett Witchel UT Austin HP Labs Rootkits are dangerous Adversary exploits insecure system Leave backdoor
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Ensuring Operating System Kernel Integri..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Ensuring Operating System Kernel Integrity with: Transcript
Osck Owen Hofmann Alan Dunn Sangman Kim Indrajit Roy Emmett Witchel UT Austin HP Labs Rootkits are dangerous Adversary exploits insecure system Leave backdoor to facilitate longterm access. Debugging as Engineering. Much of your time in this course will be spent debugging. In industry, 50% of software dev is debugging. Even more for kernel development. How do you reduce time spent debugging?. Building and Porting embedded operating systems. The Booting Process. Power On. BIOS. GRUB. Kernel. Get . Bootloader. Get Kernel. Power On. X-Loader. U-Boot. Kernel. Get . Bootloader. Get Kernel. PC. Section 2. Shells and System Calls. OSDI 2010. 10/7/10. 2. Finding a Needle in a Haystack: Facebook’s Photo Storage. OSDI 2010. 10/7/10. 3. Results: storage costs reduced 28%; 4x greater. . read throughput. Windows and Some Differences from Linux. Brian Railing. 1. st. Year PhD Student. Previously. of. Windows Server Performance Team. 2. Copyright Notice. © 2000-2005 David A. Solomon and Mark Russinovich. 0.2 0.4 0.6 0.8 1.0 0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 kernel(b) kernel(c) kernel(d) (a)blurredimage(b)no-blurredimage0.900.981.001.021.10 (5.35,3.37)(4.80,3.19)(4.71,3.22)(4.93,3.23)(5.03,3.22 Vecchiola. Postdoctoral Research Fellow. csve@unimelb.edu.au. Cloud Computing and Distributed Systems (CLOUDS) Lab . Dept. of Computer Science and Software Engineering. The University of Melbourne. Operating System Architecture. The Structure of the Operating System. Noah Mendelsohn. Tufts University. Email: . noah@cs.tufts.edu. Web: . http://www.cs.tufts.edu/~noah. Based on a presentation by Professor Alva Couch. COMP 111: Operating Systems (Fall 2013). Samuel T. King, George W. Dunlap,Peter M.Chen. . Presented By,. Rajesh . 1. References. [1] . Virtual . Machines: Supporting Changing Technology and New Applications, ECE Dept. Georgia Tech., November 14, . David Ferry, Chris Gill. Department of Computer Science and Engineering. Washington University, St. Louis MO. davidferry@wustl.edu. 1. Traditional View of Process Execution. However, the kernel is not a traditional process!. Ph. D. Course Work : PHYS 601. Statistics and Computer Applications. Presented By:. Sanjay . Godara. Dept. of Physics & Astrophysics. University of Delhi. WHAT . IS AN OPERATING SYSTEM?. S. oftware . David Ferry, Chris Gill. Department of Computer Science and Engineering. Washington University, St. Louis MO. davidferry@wustl.edu. 1. Traditional View of Process Execution. However, the kernel is not a traditional process!. CSE . 422S . - . Operating . Systems Organization. Washington University in St. Louis. St. Louis, MO 63143. 1. Things Happen: Kernel Oops vs Panic. A kernel . panic. is unrecoverable and results in an instant halt. Process concept. A process is an OS abstraction for executing a program with limited privileges. Dual-mode operation: user vs. kernel. Kernel-mode: execute with complete privileges. User-mode: execute with fewer privileges. By Dawson R. . Engler. , M. . Frans. . Kaashoek. ,. James O’Toole Jr.. Presented by Seth Goldstein. EECS 582 – W16. 1. Outline. Traditional Operating System. Exokernel. Implmentation. Kernel Comparisons.
Download Document
Here is the link to download the presentation.
"Ensuring Operating System Kernel Integrity with"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents