Penetrating an Operating System: A Study of VM/370 Integrity

نویسندگان

  • C. Richard Attanasio
  • Peter W. Markstein
  • Ray J. Phillips
چکیده

There is a large body of literature relating to computing system security that includes such issues as statements of problems and requirements for secure systems,'-' research in the design of secure computing efforts to develop techniques for verifying the correctness (and hence impenetrability) of prog r a m ~ , ~ and reports of organized efforts to determine the penetrability of various operating The literature on perating system penetration is rather sparse because most of the work has been done under classified auspices". Although the general references given here are a small representative portion of the existing literature, more extensive bibliographies are cited in References 13 and 14.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Origin of the VM/370 Time-Sharing System

VM/370 is an operating system which provides its multiple users with seemingly separate and independent IBM System/ 370 computing systems. These virtual machines are simulated using IBM Systeml370 hardware and have its same architecture. In addition, VM/370 provides a single-user interactive system for personal computing and a computer network system for information interchange among interconne...

متن کامل

A security retrofit of VMl370

The VM/370 Security Retrofit Program is a continuing research and development initiative, funded by the Defense Advanced Research Projects Agency (DARPA), with additional funding provided by the Canadian Department of N ational Defense. The program's primary goal is the security retrofit of a popular commercial operating system, VM/370. 1 Two approaches were originally planned: (1) the design o...

متن کامل

Attack Trends

The early days The origins of VMs go back almost as far as modern computing itself. Born to optimize usage of expensive computing resources and provide users with a fully dedicated and interactive computer system, the early 1960s experiences in time-sharing systems at MIT, IBM, Bolt Beranek and Newman (now BBN Technologies), and the University of California, Berkeley, laid the foundations on wh...

متن کامل

Attack Trends the Early Days Ghost in the Virtual Machine

The early days The origins of VMs go back almost as far as modern computing itself. Born to optimize usage of expensive computing resources and provide users with a fully dedicated and interactive computer system, the early 1960s experiences in time-sharing systems at MIT, IBM, Bolt Beranek and Newman (now BBN Technologies), and the University of California, Berkeley, laid the foundations on wh...

متن کامل

GPP virtualization: A comparison of software and hardware techniques for x86 virtualization

Initially, virtual machine (VM) meant a software abstraction with the looks of a computer system’s hardware. Now, VM can be seen as a layered abstraction over various places in the system including following levels of virtualization: hardware–level, operating system–level, and high–level language VMs. Hardware–level approach was the first attempt to implement virtualization. Several hardware VM...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IBM Systems Journal

دوره 15  شماره 

صفحات  -

تاریخ انتشار 1976