Penetrating an Operating System: A Study of VM/370 Integrity
نویسندگان
چکیده
There is a large body of literature relating to computing system security that includes such issues as statements of problems and requirements for secure systems,'-' research in the design of secure computing efforts to develop techniques for verifying the correctness (and hence impenetrability) of prog r a m ~ , ~ and reports of organized efforts to determine the penetrability of various operating The literature on perating system penetration is rather sparse because most of the work has been done under classified auspices". Although the general references given here are a small representative portion of the existing literature, more extensive bibliographies are cited in References 13 and 14.
منابع مشابه
The Origin of the VM/370 Time-Sharing System
VM/370 is an operating system which provides its multiple users with seemingly separate and independent IBM System/ 370 computing systems. These virtual machines are simulated using IBM Systeml370 hardware and have its same architecture. In addition, VM/370 provides a single-user interactive system for personal computing and a computer network system for information interchange among interconne...
متن کاملA security retrofit of VMl370
The VM/370 Security Retrofit Program is a continuing research and development initiative, funded by the Defense Advanced Research Projects Agency (DARPA), with additional funding provided by the Canadian Department of N ational Defense. The program's primary goal is the security retrofit of a popular commercial operating system, VM/370. 1 Two approaches were originally planned: (1) the design o...
متن کاملAttack Trends
The early days The origins of VMs go back almost as far as modern computing itself. Born to optimize usage of expensive computing resources and provide users with a fully dedicated and interactive computer system, the early 1960s experiences in time-sharing systems at MIT, IBM, Bolt Beranek and Newman (now BBN Technologies), and the University of California, Berkeley, laid the foundations on wh...
متن کاملAttack Trends the Early Days Ghost in the Virtual Machine
The early days The origins of VMs go back almost as far as modern computing itself. Born to optimize usage of expensive computing resources and provide users with a fully dedicated and interactive computer system, the early 1960s experiences in time-sharing systems at MIT, IBM, Bolt Beranek and Newman (now BBN Technologies), and the University of California, Berkeley, laid the foundations on wh...
متن کاملGPP virtualization: A comparison of software and hardware techniques for x86 virtualization
Initially, virtual machine (VM) meant a software abstraction with the looks of a computer system’s hardware. Now, VM can be seen as a layered abstraction over various places in the system including following levels of virtualization: hardware–level, operating system–level, and high–level language VMs. Hardware–level approach was the first attempt to implement virtualization. Several hardware VM...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IBM Systems Journal
دوره 15 شماره
صفحات -
تاریخ انتشار 1976