Operating Systems 2019W Lecture 19

From Soma-notes
Jump to navigation Jump to search


Video for the lecture given on March 25, 2019 is now available.


Lecture 19

Time of check to time of use

If a privileged program tries to modify a file owned by an unprivileged user, it is possible for it to be changed between the time it is checked to the time it is used (unless special care is taken).

lpr 8lgm vulnerability (look up)

Spectre and meltdown
 - information leak due to concurrency

Covert channels are when two processes (or other computational elements) communicate when they are supposed to be isolated.

kernel random number generator: combine hardware events with cryptographically secure pseudo random number generator (based on a cryptographic hash function)

clocks & security
 - replay attacks

 - high resolution clocks are dangerous