Difference between revisions of "Operating Systems 2019W Lecture 19"

From Soma-notes
Jump to navigation Jump to search
(Created page with "==Video== Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available]. ==N...")
 
Line 1: Line 1:
==Video==
==Video==


Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available].
Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available] - and is [https://www.twitch.tv/videos/401138335 on twitch.tv].


==Notes==
==Notes==

Revision as of 22:49, 25 March 2019

Video

Video for the lecture given on March 25, 2019 is now available - and is on twitch.tv.

Notes

Lecture 19
----------

TOCTTOU
Time of check to time of use

If a privileged program tries to modify a file owned by an unprivileged user, it is possible for it to be changed between the time it is checked to the time it is used (unless special care is taken).

lpr 8lgm vulnerability (look up)

Spectre and meltdown
 - information leak due to concurrency


Covert channels are when two processes (or other computational elements) communicate when they are supposed to be isolated.

kernel random number generator: combine hardware events with cryptographically secure pseudo random number generator (based on a cryptographic hash function)

clocks & security
 - replay attacks

 - high resolution clocks are dangerous