Operating Systems 2019W Lecture 19: Difference between revisions

From Soma-notes
Created page with "==Video== Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available]. ==N..."
 
 
(One intermediate revision by the same user not shown)
(No difference)

Latest revision as of 13:50, 26 March 2019

Video

Video for the lecture given on March 25, 2019 is now available.

Notes

Lecture 19
----------

TOCTTOU
Time of check to time of use

If a privileged program tries to modify a file owned by an unprivileged user, it is possible for it to be changed between the time it is checked to the time it is used (unless special care is taken).

lpr 8lgm vulnerability (look up)

Spectre and meltdown
 - information leak due to concurrency


Covert channels are when two processes (or other computational elements) communicate when they are supposed to be isolated.

kernel random number generator: combine hardware events with cryptographically secure pseudo random number generator (based on a cryptographic hash function)

clocks & security
 - replay attacks

 - high resolution clocks are dangerous