CS 513 - System Security
Lecture 18

Lecturer: Professor Fred B. Schneider
Notes by: Vicky Weissman
Lecture Date: 4/4/00


Today's Topic

Implementing Complete Mediation with Today's Hardware

Pros and Cons

Current Hardware Characteristics

Implementing Complete Mediation

The operating system is a wrapper (see last lecture for details on wrappers). Specifically, instructions that are restricted to the supervisor state are checked by the operating system, while the rest can be executed by the hardware directly. Moving the wrapper into the operating system reduces the cost of checking for policy compliance by a procedure call.

In addition to the protection provided by the wrapper, the memory architecture provides a mechanism for restricting memory access.

Reference Monitor Attacks

A program could compormise the security by: The memory architecture is designed to resist both of these attacks, by making areas of the memory inaccessible.

Approaches to Protection

Protection is usually implemented by restricting what operations can be called. Controlling the interpretation of the operand, however, would allow a finer granularity of protection. By manipulating the name to address translation table, the security mechanism could make it impossible for a program to issue a prohibited instruction.