Skip to main content

Secure Hybrid Operating System “Linux over Fenix”

  • Conference paper
  • 863 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3685))

Abstract

The article discusses an approach to the construction of secure data processing systems based on the hybrid operating system technology, making it possible to use several different operating systems simultaneously on the same computer and arrange for an interaction between those. The Fenix secure operating system developed at the Software Security Laboratory(SSL) of the St. Petersburg State Polytechnical University (SPSPU) is proposed to be used as a host operating system, while the popular Linux OS — as a guest operating system, to ensure compatibility with commonly used applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zegzhda, D.P., Stepanov, P.G., Otavin, A.D.: Fenix Secure Operating System: Principles, Models and Architecture. In: Proceeding of International Workshop on Mathematical Methods, Models and Architectures for Network Security Systems. Information Assurance in Computer Networks, pp. 207–218. Springer, Heidelberg (2001)

    Google Scholar 

  2. Goldberg, R.: Architectural Principles for Virtual Computer Systems. PhD thesis, Harvard University (1972)

    Google Scholar 

  3. Goldberg, R.: Survey of virtual machine research. IEEE Computer Magazine 7, 34–45 (1974)

    Google Scholar 

  4. Bugnion, E., Devine, S., Rosenblum, M.: Disco: running commodity operating systems on scalable multiprocessors. In: Proc. 16th ACM Symp. Operating Sys. Principles (October 1997)

    Google Scholar 

  5. Sugerman, J., Venkitachalam, G., Lim, B.: Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In: Proc. 2001 Ann. USENIX Tech. Conf., Boston, MA, USA (June 2001)

    Google Scholar 

  6. Waldspurger, C.A.: Memory resource management in VMware ESX Server. In: Proc. 2002 Symp. Operating Sys. Design and Implementation (December 2002)

    Google Scholar 

  7. Chen, P.M., Noble, B.D.: When virtual is better than real. In: Proc. 2001 Workshop on Hot Topics in Operating Sys. (HotOS-VIII), Schloss Elmau, Germany (May 2001)

    Google Scholar 

  8. Engler, D., Kaashoek, M., O’Toole, J.: Exokernel: Anoperating system architecture for application-level resource managment. In: Proc. 15th ACM Symp. on Operating Sys. Principles (December 1995)

    Google Scholar 

  9. Grizzard, J., Dodson, E., Conti, G., Levine, J., Owen, H.: Towards a trusted immutable kernel extension (TIKE) for selfhealing systems: a virtual machine approach. In: Proc. 5th IEEE Information Assurance Workshop, June 2004, pp. 444–446 (2004)

    Google Scholar 

  10. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a Virtual Machine-Based Platform for Trusted Computing. In: Proceedings of the nineteenth ACM Symposium on Operating Systems Principles, pp. 193–206. ACM Press, New York (2003)

    Chapter  Google Scholar 

  11. Trusted Computing Platform Alliance. TCPA main specification v. 1.1b, http://www.trustedcomputing.org/

  12. Carroll, A., Juarez, M., Polk, J., Leininger, T.: Microsoft Palladium: A business overview (August 2002), http://www.microsoft.com/PressPass/features/2002/jul02/0724palladiumwp.asp

  13. Microsoft next-generation secure computing base—technical FAQ (February 2003), http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/%news/NGSCB.asp

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zegzhda, D.P., Vovk, A.M. (2005). Secure Hybrid Operating System “Linux over Fenix”. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_21

Download citation

  • DOI: https://doi.org/10.1007/11560326_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics