A security retrofit of VMl370
نویسنده
چکیده
The VM/370 Security Retrofit Program is a continuing research and development initiative, funded by the Defense Advanced Research Projects Agency (DARPA), with additional funding provided by the Canadian Department of N ational Defense. The program's primary goal is the security retrofit of a popular commercial operating system, VM/370. 1 Two approaches were originally planned: (1) the design of a feasible, formally verified security kernel to VM/370 and (2) a "hardening" effort to repair known VM/370 penetration weaknesses. It was subsequently decided not to proceed with the VM/370 hardening task because of the uncertainty of the end result: correction of known security flaws does not guarantee the absence of exploitable, but not yet detected, security flaws in the hardened system. In the first year of the research program, the feasibility of adding a security kernel to VM/370 was studied and a kernel design for the system was produced. The retrofitted system is called K VM/370 (for Kernelized VM/370). The security enforcement mechanism, the kernel, must implement a reference monitor2 that enforces a security policy. A security kernel is a reference monitor that:
منابع مشابه
VM/370 - A Study of Multiplicity and Usefulness
It describes the virtual machine concept and its capabilities and implementation in VMl370. Two components of VMl370 are discussed the control program and the Conversational Monitor System. The usefulness of VMl370 in multiple and diverse environments is covered. New developments in VMl370 from hardware assists to system extensions, networking, and handshaking are briefly described as an introd...
متن کاملRetrofit of Heat Exchanger Networks Considering Existing Structure: A New Targeting Procedure
A new retrofit targeting procedure, based on pinch technology has been developed. The new procedure considers existing structure of a given network and finds the most compatible configuration with the network. To achieve this aim, the procedure uses a linear programming technique that maximize the compatibility. Good compatibility between old and new networks helps to make the best use of c...
متن کاملEffectiveness of Energy Retrofit on Energy Consumption and Occupants' Comfort: Case of Shahid Beheshti University Dorimitories
In addition to the building properties effect on energy consumption, it is important to consider occupant’s energy behavior and their interaction with building systems in energy calculations. According to studies, energy retrofit regardless of considering this factor, has a lower effect on reducing the energy consumption. This study investigates the impact of energy retrofit in two (retrofitted...
متن کاملSurvivability From a Sow’s Ear: The Retrofit Security Requirement
This paper considers the survivability requirement for production operating systems that underlie typical information systems. Since economic incentives give competitive advantages to imperfect and therefore insecure software, it seems inevitable to consider retrofitting some form of security to existing systems. This approach has long been anathema in the security community. We outline the pra...
متن کاملIt Network Security for Control and Communication Systems in the Power Industry
Designing, implementing, running, and managing control and communication systems to state-of-the-art security standards is a major challenge to both power system integrators and operators, even more so in multi-vendor environments. In this paper, we discuss how industrially ruggedized network security appliances can provide building blocks and contribute to security solutions in both retrofit a...
متن کامل