1 CS 6V81-05: System Security and Malicious Code Analysis Understanding the OS Architecture and Linux History Zhiqiang Lin Department of Computer Science University of Texas at Dallas February 15 th, 2012
6 Computer System Components 1 Hardware - provides basic computing resources (CPU, memory, I/O devices). 2 Operating system-controls and coordinates the use of the hardware among the various application programs for the various users. 3 Applications programs-define the ways in which the system resources are used to solve the computing problems of the users (compilers, database systems, video games, business programs). 4 Users (people, machines, other computers).
7 What is an Operating System An operating system is the "permanent" software that controls/abstracts hardware User applications can thus be simpler and device-independent
8 Importance of Operating Systems System API are the only interface between user applications and hardware API are designed for general-purpose, not performance driven (e.g. network applications) OS code cannot allow any bug Any break(e.g. invalid access) causes reboot The owner of OS technology controls the software & hardware industry Operating systems and computer architecture influence each other (Wintel)
11 OS Kernel Approaches Integrated Kernel Approach "Monolithic kernel" Flat function calling UnixWare, Solaris, AIX, HP-UX, DG-UX, IRIX, Linux, etc Microkernel Approach Serverization based on MK Message passing Cray UNICOS/mk, CMU Mach Chorus, Digital UNIX, ETRI MISIX, Linux Mk, etc
12 2-layered OS Architecture
13 3-layered OS Architecture
14 3-layered with Microkernel OS
15 4-layered OS Architecture: android
16 Modern operating systems x86 platform Linux Windows Mac platform-mac i-os Oracle/Sun Solaris & Unix (Sun workstations) IBM AIX (mainframes) Embedded systems (special-purpose OS) Palm (Handheld), PocketPC (Windows CE), etc Xbox, etc Android (Linux)
17 System Category Mainframe Systems Desktop Systems Parallel Systems Distributed Systems Real-Time Systems Handheld Systems
18 Migration of Operating-System Concepts and Features source: OPERATING SYSTEM CONCEPTS Sixth Edition
19 Case Study: Unix Architecture Typical computer system consists of: Hardware Operating system Applications and utilities Typical OS includes a user interface (and programmer interface) or command interpreter (the shell)
23 Dennis Ritchie An American computer scientist who "helped shape the digital era." He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in Ritchie was the head of Lucent Technologies System Software Research Department when he retired in He was the R in K&R C and commonly known by his username dmr... September 9, 1941 October 12, 2011 Computer Scientist One of the greatest hackers Turing Award...
24 Kenneth Thompson An American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson is notable for his work with the B programming language (basing it mainly on the BCPL language he had used to write Unix while in the MULTICS project), the C programming language, and as one of the creators and early developers of the Unix and Plan 9 operating systems. Other notable contributions included his work on regular expressions and early computer text editors QED and ed, his work on computer chess that included creation of endgame tablebases and the chess machine Belle, and most recently the co-creation of Google s programming language Go... Born February 4, 1943 Computer Scientist One of the greatest hackers Turing Award...
25 What were real hacker doing at 1980s
26 Basic Concepts Kernel Architecture GNU/Linux Summary Richard Stallman In September 1983, he launched the GNU Project to create a free Unix-like operating system, and he has been the project s lead architect and organizer. With the launch of the GNU Project, he initiated the free software movement; in October 1985 he founded the Free Software Foundation... Born March 16, 1953 Software freedom activist and a programmer One of the greatest hackers
27 Andrew S. Tanenbaum Andrew Stuart "Andy" Tanenbaum (sometimes referred to by the handle ast) (born March 16, 1944) is a professor of computer science at the Vrije Universiteit, Amsterdam in the Netherlands. He is best known as the author of MINIX, a free Unix-like operating system for teaching purposes, and for his computer science textbooks, regarded as standard texts in the field. He regards his teaching job as his most important work...http://en.wikipedia.org/wiki/andrew_s._tanenbaum Born March 16, 1944 A Professor ACM/IEEE/Fellow,...
28 Linus Torvalds He is best known for having initiated the development of the open source Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project s coordinator. He also created the revision control system Git as well as the Scuba diving log book software Subsurface...http://en.wikipedia.org/wiki/Linus_Torvalds Born December 28, 1969 Software engineer One of the greatest hackers
29 The GNU Project
30 Birth of Linux
31 Definition of Linux Linux is a Unix clone written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. It aims towards POSIX compliance. It has all the features you would expect in a modern fully-fledged Unix, including true multitasking, virtual memory, shared libraries, demand loading, shared copy-on-write executables, proper memory management and TCP/IP networking. It is distributed under the GNU General Public License. Linux was first developed for 386/486-based PCs. These days it also runs on ARMs, DEC Alphas, SUN Sparcs, M68000 machines (like Atari and Amiga), MIPS and PowerPC, and others.
Chapter 1: Operating System Models 1 2 Operating System Models 2.1 Introduction Over the past several years, a number of trends affecting operating system design are witnessed and foremost among them is
The copyright of this thesis vests in the author. No quotation from it or information derived from it is to be published without full acknowledgement of the source. The thesis is to be used for private
A Practical Look at Micro-Kernels and Virtual Machine Monitors François Armand, Michel Gien, Member, IEEE Abstract In this paper, we look at two different approaches used to provide embedded system support
PART II Information Technology Infrastructure CHAPTER 5 IT Infrastructure and Emerging Technologies CHAPTER 6 Databases and Information Management CHAPTER 7 Telecommunications, the Internet, and Wireless
Ph.D Dissertation Proposal A Firewall Model of File System Security By Lihui Hu Department Of Computer Science Michigan Technological University March 2010 Committee Members: Dr. Jean Mayo, Chair Dr. Steve
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology firstname.lastname@example.org Abstract Virtualization plays a major role in helping the organizations to reduce the operational
White Paper: PHP Leads Web 2.0 A Closer Look at the Hidden Drivers and Enablers of the Second Internet Revolution By Andi Gutmans, Co-Founder and Vice President of Technology, Zend Technologies, Inc. September
University of Utah MSIS Project VoIP System Course Report Jeremy Schreiner, Mark Christensen, Jeff Ipson Background Voice over Internet Protocol has a rich history reaching back several decades. Telephone
David Chappell December 2011 WHAT IS AN APPLICATION PLATFORM? Sponsored by Microsoft Corporation Copyright 2011 Chappell & Associates Just about every application today relies on other software: operating
COMPARISON BETWEEN QNX RTOS V6.2 AND RED HAT EMBEDDED LINUX Copyright Dedicated Systems. All rights reserved, no part of the contents of this document may be reproduced or (ELDS) V1.1 Copyright Dedicated
Development of Android Mobile Application for Cloud Server Miss. Bhagyashri D. Patil Department of Computer Science and H.V.P.M s College of Engg.& Technology, Amravati Email: email@example.com
Free/Open Source Software Network Infrastructure and Security Gaurab Raj Upadhaya Asia-Pacific Development Information Programme e-primers on Free/Open Source Software United Nations Development Programme-Asia-Pacific
MASARYK UNIVERSITY FACULTY OF INFORMATICS Best Practices in Scalable Web Development MASTER THESIS Martin Novák May, 2014 Brno, Czech Republic Declaration Hereby I declare that this paper is my original
UNIVERSITATEA DIN BUCURESTI FACULTATEA DE FIZICA COMPUTER OPERATED RECONNAISANCE ENTITY Graduation Paper Student: ANDREI-LUCIAN BOGZA Coordinator: Lect. Dr. CORNEL MIRONEL NICULAE 2011 Content Content...
The Design of NetSecLab: A Small Competition-Based Network Security Lab Christopher P. Lee, A. Selcuk Uluagac, Kevin D. Fairbanks, John A. Copeland Communications Systems Center, School of Electrical and
February 2009 Seeding the Clouds: Key Infrastructure Elements for Cloud Computing Page 2 Table of Contents Executive summary... 3 Introduction... 4 Business value of cloud computing... 4 Evolution of cloud
Study into the use of Open Source Software in the Public Sector Part 1 OSS Fact sheet A report directed by Patrice-Emmanuel Schmitz, Unisys Belgium An IDA Study Interchange of Data between Administrations
SOFTWARE-PRACTICE AND EXPERIENCE. VOL. 12. 1147-1162 (1982) The Newcastle Connection or UNIXes of the World Unite! D. R. BROWNBRIDGE, L. F. MARSHALL AND B. RANDELL Computing Laboratory, The University,
Vishwakarma Institute of Technology, Pune-37. SYMANTEC Project Title: LEAF-SNMP PROJECT SYNOPSIS Department of Computer Engineering CONTEXT A computer network consists of network elements like nodes, links,
Cloud Computing V Rajaraman V Rajaraman is at the Indian Institute of Science, Bangalore. Several generations of scientists and engineers in India have learnt computer science using his lucidly written
Some Simple Economics of Open Source Author(s): Josh Lerner and Jean Tirole Source: The Journal of Industrial Economics, Vol. 50, No. 2 (Jun., 2002), pp. 197-234 Published by: Blackwell Publishing Stable
Investigation of IT Auditing and Checklist Generation Approach to Assure a Secure Cloud Computing Framework Rajni Maheshwari M.Tech (Computer) College of Engineering, Bharati Vidyapeeth Deemed University
Computing and Informatics, Vol. 31, 2012, 743 757 FLEXIBLE ORGANIZATION OF REPOSITORIES FOR PROVISIONING CLOUD INFRASTRUCTURES Joanna Kosińska, Jacek Kosiński S lawomir Zieliński, Krzysztof Zieliński Department
MIDDLEWARE 1 David E. Bakken 2 Washington State University Middleware is a class of software technologies designed to help manage the complexity and heterogeneity inherent in distributed systems. It is