Recommendations for secure initialization routines in operating systems

Download
Author
Dodge, Catherine A.
Date
2004-12Advisor
Irvine, Cynthia E.
Nguyen, Thuy D.
Metadata
Show full item recordAbstract
While a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set of threats relevant to the initialization sequence was developed. A thorough study was also made to determine the degree to which initialization code adheres to widely accepted software engineering principles. Based upon this threat analysis and the observed strengths and weaknesses of existing systems, a set of recommendations for initialization sequence architecture and implementation have been developed. These recommendations can serve as a guide for future operating system development.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
A Study of Initialization in Linux and OpenBSD
Dodge, Catherine; Irvine, Cynthia E.; Nguyen, Thuy D. (Operating Systems Review, 2005-05);The code that initializes a system can be notoriously difficult to understand. In secure systems, initialization is critical for establishing a starting state that is secure. This paper explores two architectures used for ... -
A framework for dynamic subversion
Rogers, David T. (Monterey, California. Naval Postgraduate School, 2003-06);The subversion technique of attacking an operating system is often overlooked in information security. Operating Systems are vulnerable throughout their lifecycle in that small artifices can be inserted into an operating ... -
Accuracy of shipborne kinematic GPS surveying
Grinker, Barry (Monterey, California. Naval Postgraduate School, 1991-09);In December 1990 an experiment was conducted at the Naval Postgraduate School in Monterey, California in which four different receivers, mounted on the mast of a ship, collected data simultaneously for several hours at ...