Difference between revisions of "Operating Systems 2019W Lecture 19"

From Soma-notes
Jump to navigation Jump to search
 
Line 1: Line 1:
==Video==
==Video==


Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available] - and is [https://www.twitch.tv/videos/401138335 on twitch.tv].
Video for the lecture given on March 25, 2019 [https://homeostasis.scs.carleton.ca/~soma/os-2019w/lectures/comp3000-2019w-lec19-20190325.m4v is now available].


==Notes==
==Notes==

Latest revision as of 09:50, 26 March 2019

Video

Video for the lecture given on March 25, 2019 is now available.

Notes

Lecture 19
----------

TOCTTOU
Time of check to time of use

If a privileged program tries to modify a file owned by an unprivileged user, it is possible for it to be changed between the time it is checked to the time it is used (unless special care is taken).

lpr 8lgm vulnerability (look up)

Spectre and meltdown
 - information leak due to concurrency


Covert channels are when two processes (or other computational elements) communicate when they are supposed to be isolated.

kernel random number generator: combine hardware events with cryptographically secure pseudo random number generator (based on a cryptographic hash function)

clocks & security
 - replay attacks

 - high resolution clocks are dangerous