期刊文献+

一个分层隔离的操作系统内核 被引量:1

Layered and separated operating system kernel
下载PDF
导出
摘要 传统单块结构操作系统的所有内核代码在一个公共的、共享的地址空间运行,因此内核中任何一个漏洞或在内核中加载任何不可靠模块都会威胁到整个系统的安全。研究并实现了一个分层隔离的操作系统安全内核,将内核特权分割隔离,阻止内核安全漏洞的扩散,防止恶意内核模块代码对内核代码数据的随意篡改。原型操作系统完全自主开发,支持i386体系结构。 In traditional monolithic kernel operating systems, all kernel codes run within a common and shared address space, and any vulnerabilities in kernel or any untrusted modules loaded in kernel would compromise the whole system security. The development of a layered and separated secure kernel was described in this paper. Since the powers of kernel are partitioned, the vulnerabilities of kernel are confined, and arbitrarily tampering of kernel by malice codes was prevented. The prototype system is entirely developed from beginning for the i386 architecture.
出处 《计算机应用》 CSCD 北大核心 2005年第6期1286-1289,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60473093) 江苏省自然科学基金资助项目(BK2002073)
关键词 操作系统安全 内核结构 隔离保护机制 计算机安全 operating system security kernel structure separation mechanism computer security
  • 相关文献

参考文献4

  • 1BELL DE, LAPADULA LJ. Secure computer systems: unified exposition and multics interpretation[ R]. MTR-2997, MITRE Corp,1976.
  • 2WALKER KM, STEME DF, BADGER ML, et al. Confining root programs with domain and type enforcement(DTE) [ A]. Proceedings of the 6th USENIX Security Symposium[ C]. Usenix Association,1996. 21-36.
  • 3BLACK DL, GOLUB DB, JULIN DP, et al. Microkernel Operating System Architecture and Mach[ A]. Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures[ C].Usenix Association, 1992. 11-30.
  • 4HILDEBRAND D. An architectural overview of QNX[ A]. Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures[C]. Usenix Association, 1992. 113-126.

同被引文献6

  • 1WALKER KM.STEME DF.BADGER ML, et al.Confining root programs with domain and type enforcement( DTE )[A].Proceedings of the 6th USENIX Security Symposium[C].Usenix Association, 1996.21 - 36.
  • 2BELL DE, LAPADULA LJ.Secure computer systems: unified exposition and multics interpretation[R].MTR-2997, MITRE Corp, 1976.
  • 3Gaoshou Zhai, Raodong Li.Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux[C].Intemational Conference on Security Technology Hainan, DEC 13-15, 2008, pp.50-56.
  • 4Gaoshou Zhai, Wenfin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang.Design and implementation of a tool for analyzing SELinux secure policy[C].Proceedings of the 2nd International Conference Page: 446-451, 2009.
  • 5李忠,王小波,余杰.x86汇编语言:从实模式到保护模式[M].北京:电子工业出版社.2013,375.
  • 6Andrew S.Tanenbaum, Albert S.Woodhull.Operating Systems : Design and Implementation[M] (Third Edition ) .New Jersey: Prentice Hall.2006.1054.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部