Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The Race to Build a Secure Operating System
Defense Tech ^ | 5/11/2010 | Kevin Coleman

Posted on 05/11/2010 5:27:57 PM PDT by ErnstStavroBlofeld

In response to the continuous compromise of networks, multiple countries have begun developing secure platforms and operating systems. Computer companies, university researchers, defense R&D contractors and militaries around the world recognize the criticality of networks and embedded processors within their equipment. They also recognize how vulnerable they are and that’s why so much attention is being given to building in security at every level of the system including the operating system.

As discussed here, China’s Trusted Computing Platform (TCP) program has been underway for some time now and can be traced back to the early 2000s. The Chinese TCP includes multiple layers of built-in security, as well as trusted computing components at the chip operating system level and the machine operating system level.

European Union Early in 2009 a Dutch university was awarded a grant for $3.3 million from the European Research Council to fund 5 more years of work on a Unix derivative version operating system called Minix. This research effort is designed to be more resilient and secure than either Linus or Windows. The most impressive feature in Minix is said to be its self healing feature. This is believed to be the first operating system with the capable of fixing itself when a bug is detected.

Australia One of the more recent secure operating systems in the world is the Secure Microkernel Project (seL4). Late in 2009 NICTA announced that it has completed the formal verification of the seL4 kernel. It is believed that this makes seL4 the world’s first general purpose OS kernel with a formal mathematical proof that the implementation does what the specification says. The proof is machine checked and one of the largest ever done.

(Excerpt) Read more at defensetech.org ...


TOPICS: Technical
KEYWORDS: computers; cyberwarfare; defensenetworks; networks; operatingsystem; os; supercomputer; tcp

1 posted on 05/11/2010 5:27:57 PM PDT by ErnstStavroBlofeld
[ Post Reply | Private Reply | View Replies]

To: sonofstrangelove
Yeah. 2010, and you want a 'secure' OS. Har har. I got yer 'secure' operating system:

"But know this, that in the last days perilous times will come: for men will be lovers of themselves, lovers of money, boasters, proud, blasphemers, disobedient to parents, unthankful, unholy, unloving, unforgiving, slanderers, without self-control, brutal, despisers of good, traitors, headstrong, haughty, lovers of pleasure rather than lovers of God, having a form of godliness but denying its power. And from such people turn away, for his name is Obama."

2 posted on 05/11/2010 5:40:41 PM PDT by Viking2002
[ Post Reply | Private Reply | To 1 | View Replies]

To: Viking2002

My father bought me an abacus for my 5th birthday. In fact, I still have it. When some NK or Chinese fires a EMP burst I guess we will have to return to using a abacus.


3 posted on 05/11/2010 5:42:59 PM PDT by ErnstStavroBlofeld ("I have learned to use the word "impossible" with the greatest caution."-Dr.Wernher Von Braun)
[ Post Reply | Private Reply | To 2 | View Replies]

To: sonofstrangelove

I went high tech - I got a slide rule.


4 posted on 05/11/2010 5:52:02 PM PDT by mike_9958
[ Post Reply | Private Reply | To 3 | View Replies]

To: mike_9958

I still have my slide rule too. I prefer that to a calculator.


5 posted on 05/11/2010 5:54:27 PM PDT by ErnstStavroBlofeld ("I have learned to use the word "impossible" with the greatest caution."-Dr.Wernher Von Braun)
[ Post Reply | Private Reply | To 4 | View Replies]

To: sonofstrangelove

Need to set things up so that the hardware and installed software never is directly accessed by the users or network. Set it up as a virtual O/S that is not accessible by the outside because under the virtual system software the virtual O/S never directly accesses hardware or network ports. If the virtual machine O/S somehow does get infected or corrupted, simply shut it down and restart the virtual O/S. That part of the hard drive never touches the actual software of the bios or O/S software.


6 posted on 05/11/2010 5:55:32 PM PDT by Secret Agent Man (I'd like to tell you, but then I'd have to kill you.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Secret Agent Man

Very good points!


7 posted on 05/11/2010 5:56:31 PM PDT by ErnstStavroBlofeld ("I have learned to use the word "impossible" with the greatest caution."-Dr.Wernher Von Braun)
[ Post Reply | Private Reply | To 6 | View Replies]

To: sonofstrangelove
My first computer was a Digicomp I from Edmund Scientific. I got it for Christmas when I was five:

"But know this, that in the last days perilous times will come: for men will be lovers of themselves, lovers of money, boasters, proud, blasphemers, disobedient to parents, unthankful, unholy, unloving, unforgiving, slanderers, without self-control, brutal, despisers of good, traitors, headstrong, haughty, lovers of pleasure rather than lovers of God, having a form of godliness but denying its power. And from such people turn away, for his name is Obama."

8 posted on 05/11/2010 6:09:32 PM PDT by Viking2002
[ Post Reply | Private Reply | To 3 | View Replies]

To: sonofstrangelove

I got pretty good with one of those when I was stationed on Okinawa in 1970. When I went to the counter in a store I and the clerk would place our bead frames on the counter and both would tot up the items to be purchased and each present the abacus with the finished calculation for the other to inspect. If they agreed the clerk punched it into the cash register and the transaction was complete. If they disagreed then we both flicked the beads again until agreement.


9 posted on 05/11/2010 6:11:25 PM PDT by arthurus ("If you don't believe in shooting abortionists, don't shoot an abortionist." -Ann C.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: sonofstrangelove

My first Tandy computer had DOS 2.11 built into ROM. Probably PROM, but it was pretty secure.

Put the operating system on a read-only card and plug it into the Mobo.


10 posted on 05/11/2010 6:24:27 PM PDT by meyer (Big government is the enemy of freedom.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: meyer

I remember that 16 bits were a big thing.


11 posted on 05/11/2010 6:39:11 PM PDT by ErnstStavroBlofeld ("You hit somebody with your fist and not with your fingers spread:-General Heinz Guderian)
[ Post Reply | Private Reply | To 10 | View Replies]

To: sonofstrangelove

bflr


12 posted on 05/11/2010 6:41:28 PM PDT by Captain Beyond (The Hammer of the gods! (Just a cool line from a Led Zep song))
[ Post Reply | Private Reply | To 1 | View Replies]

To: sonofstrangelove
This research effort is designed to be more resilient and secure than either Linus or Windows.

Good to know. Really.

13 posted on 05/11/2010 6:47:02 PM PDT by Glenn (iamtheresistance.org)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sonofstrangelove
Linux. Why reinvent the wheel? Viruses and malware can't attack it.

14 posted on 05/11/2010 7:49:47 PM PDT by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson