System Security

Course description

Operating systems provide the fundamental mechanisms for securing computer processing. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this course, we examine what it takes to build a secure operating system, and explore the major systems development approaches that have been applied towards building secure operating systems. This journey has several goals: access control, file systems encryption, and isolation. Moreover, the students will get various hand-on experiences with common Unix configurations.

Keywords

DAC, SELinux, Capability, FDE, Syscalls.

Prerequisite

Introduction to UNIX.

Bibliography

  • Operating System Security, by Trent Jaeger, 2008
  • Computer Security Principles and Practice (4th edition), by William Stallings and Lawrie Brown, 2017
  • Computer Systems: A Programmer’s Perspective (3rd edition), by Randal E. Bryant and David R. O’Hallaron, 2016
  • Introduction of Computer Security, by Michael T. Goodrich and Roberto Tamassia, 2011

Biography

Mohamed Sabt is a full professor at the University of Rennes. Mohamed Sabt’s research focuses on:

  • Identification of flaws inside the design of security protocols as well as their implementations,
  • Smartphones security, Secure Elements (SE), and Trusted Execution Environment (TEE),
  • Digital Rights Management (DRM).

Mohamed Sabt carries out his research within the SPICY Team at IRISA.