DOC PREVIEW
PSU CSE 543 - Protection

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

ProtectionProtectionButler W. LampsonButler W. LampsonWeina Ge & Divya MuthukumaranOutlineOutline Introduction What is protection What are involved in the protection system Why protection Introduction What is protection What are involved in the protection system Why protection Two abstract models Message system Object systemOutlineOutlineProtectionProtectionDefinitionDefinitionAll the mechanisms that All the mechanisms that controlcontrol the the acce ssacce ss of a of a programprogram to toother things in the systemother things in the systemProtectionProtectionDefinitionDefinitionAll the mechanisms that All the mechanisms that controlcontrol the the acce ssacce ss of a of a programprogram to toother things in the systemother things in the systemCategories of protection mechanismsCategories of protection mechanismsSupervisor/user modeSupervisor/user modeMemory relocation and bounds registerMemory relocation and bounds registerAccess control to file directoriesAccess control to file directoriesPassword logonPassword logon……Protection (Cont.)Protection (Cont.)Different systems can adopt different protectionDifferent systems can adopt different protectionmechanismsmechanismsProtection (Cont.)Protection (Cont.)Different systems can adopt different protectionDifferent systems can adopt different protectionmechanismsmechanismsA single system can also have various methodsA single system can also have various methodsto protect targets that of different characteristicsto protect targets that of different characteristicslow-level hardware protection: TCPlow-level hardware protection: TCPhigh-level user interaction: passwordhigh-level user interaction: passwordProtection (Cont.)Protection (Cont.)Why protection?Why protection?friendly and infallible users?friendly and infallible users?Protection (Cont.)Protection (Cont.)Why protection?Why protection?friendly and infallible users?friendly and infallible users?the real world is the real world is dangerousdangerous!!DON’T openthe door!Protection (Cont.)Protection (Cont.)Why protection?Why protection?friendly and infallible users?friendly and infallible users?the real world is the real world is dangerousdangerous!!DON’T openthe door!single usersingle processsingle usermulti-processmulti-usermulti-processesMotivationMotivationKeep the harm from spreadingKeep the harm from spreadingCategories of inflictionCategories of inflictionDestroy of modifying others dataDestroy of modifying others dataAccessing (Accessing (r/wr/w) without permission) without permissionDegrading the service another user gets (storage, CPU time)Degrading the service another user gets (storage, CPU time)MotivationMotivationKeep the harm from spreadingKeep the harm from spreadingCategories of inflictionCategories of inflictionDestroy of modifying others dataDestroy of modifying others dataAccessing (Accessing (r/wr/w) without permission) without permissionDegrading the service another user gets (storage, CPU time)Degrading the service another user gets (storage, CPU time)Different protection environments for contextsDifferent protection environments for contextsprotection context, environment, state, capability list, ring,protection context, environment, state, capability list, ring,domaindomainMessage systemMessage systemA primitive protection systemA primitive protection systemProcessesProcessesTwo characteristics:Two characteristics:Complete isolation - eComplete isolation - each process is a single domainach process is a single domainSharing via message passingSharing via message passingMessage systemMessage systemA primitive protection systemA primitive protection systemProcessesProcessesTwo characteristics:Two characteristics:Complete isolation - eComplete isolation - each process is a single domainach process is a single domainSharing via message passingSharing via message passingMessageMessageIdentification of the senderIdentification of the senderCannot be forged Cannot be forged –– supplied by the system supplied by the systemDataDataSubroutine mechanismSubroutine mechanismScenarioScenarioA Bparameterreturn valueSubroutine mechanismSubroutine mechanismScenarioScenarioProtect the Protect the ‘‘entryentry’’B: the supervisor & A : the userB: the supervisor & A : the userB determines where to wait for AB determines where to wait for A’’s messages messageA Bparameterreturn valueSubroutine mechanismSubroutine mechanismScenarioScenarioProtect the Protect the ‘‘entryentry’’B: the supervisor & A : the userB: the supervisor & A : the userB determines where to wait for AB determines where to wait for A’’s messages messageProtect the Protect the ‘‘returnreturn’’B returns extra messagesB returns extra messagesIgnored because A knows exactly when to expect the returned messageIgnored because A knows exactly when to expect the returned messageB never returnsB never returnscheck t1, t2check t1, t2A Bparameterreturn valuet2CABt1reliableSubroutine mechanismSubroutine mechanismScenarioScenarioProtect the Protect the ‘‘entryentry’’B: the supervisor & A : the userB: the supervisor & A : the userB determines where to wait for AB determines where to wait for A’’s messages messageProtect the Protect the ‘‘returnreturn’’B returns extra messagesB returns extra messagesIgnored because A knows exactly when to expect the returned messageIgnored because A knows exactly when to expect the returned messageB never returnsB never returnscheck t1, t2check t1, t2A Bparameterreturn valuet2CABt1reliableDisadvantagesDisadvantagesNo control over a runaway processNo control over a runaway processCannot force a process to do anythingCannot force a process to do anythingCannot destroy itCannot destroy itInconvenient to share informationInconvenient to share informationhave to share and check process nameshave to share and check process


View Full Document

PSU CSE 543 - Protection

Documents in this Course
Agenda

Agenda

14 pages

HYDRA

HYDRA

11 pages

PRIMA

PRIMA

15 pages

CLIMATE

CLIMATE

15 pages

Load more
Download Protection
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Protection and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Protection 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?