Operating System Security Research - PowerPoint PPT Presentation

1 / 6
About This Presentation
Title:

Operating System Security Research

Description:

Computers were never designed with security in mind: So what can we do? ... Modern operating systems are huge and bloated: Too much code to make it all secure ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 7
Provided by: ieeeEceU
Category:

less

Transcript and Presenter's Notes

Title: Operating System Security Research


1
Operating System Security Research
  • David Lie
  • Department of Electrical and Computer Engineering
  • University of Toronto

2
Why do we need computer security?
  • We depend on computers for a lot of things
  • Banking/Finance
  • Communication (e-mail, IM, VOIP)
  • Electronic Voting
  • Health Records
  • Filing your taxes
  • Computers were never designed with security in
    mind
  • So what can we do? Start over again from scratch?

Find ways to make todays systems secure!
3
Why work on existing systems?
  • Too hard to move to new systems
  • Moving all your software to a new system is
    expensive/time consuming.
  • Solving systems now means
  • Exciting ideas getting deployed right away
  • New commercial ideas (companies)
  • Saving people from a lot of grief

4
Proxos Composing Operating Systems
Windows VM
Linux VM
Split Application
Private OS Methods
Other Applications
Host Process
Proxos
Windows OS Kernel
VMM
Hardware
  • Virtual Machine Monitor (VMM) can run more than
    one OS simultaneously
  • Pick the best parts of each OS
  • Linux security with Windows ease of use

5
Hardware Root of Trust
  • Modern operating systems are huge and bloated
  • Too much code to make it all secure
  • Lots of interest now in making hardware the new
    root of trust
  • Have software trust the hardware directly, by
    pass the OS for protection of data, cryptographic
    keys, user interaction
  • Initiatives like Lagrande (Intel), Presidio
    (AMD), TCG (Trusted Computing Group)
  • Project
  • Making devices that applications can use without
    trusting the OS
  • Means the OS can be hacked, but your data is
    protected!

6
Courses
  • ECE468 4th year course in computer security
  • Introduction to the basics of security
  • Buffer overflows and exploits, mitigation
  • Basic Cryptography
  • SSL and Web security
  • Network security
  • ECE1776 Graduate Security course covering topics
    in
  • Introduction to current research computer
    security
  • Structured as a seminar/reading course project.
Write a Comment
User Comments (0)
About PowerShow.com