Building a trusted computing base
Kernel and Operating System Security
25.
Modes
26.
Monolithic Kernel
27.
Microkernel
28.
Pros and Cons of Microkernels: Thorvalds vs. Tanenbaum
29.
Armored Monolithic Kernel
30.
Taming with VM Approaches
31.
Access Control Mechanism: Access Matrix
32.
Access Decision Tuple (from IBM book)
33.
Access Control Lists
34.
What Capabilities are NOT
35.
Object Capabilities
36.
Environment
37.
Symlinks
38.
File Handling
39.
SetUID Programs as a classic example of "confused deputy"
40.
Shatter Attacks: Why Services under Windows should not use GUIs
41.
Symbian OS