Skip to main content

ProtectOS: Operating system and hardware support for small objects

  • Secure Hardware And Implementation Issues
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

  • 125 Accesses

Abstract

The Computer Architecture for Secure Systems (CASS) project has developed an architecture and tools to ensure the security and integrity of software in distributed systems. In this paper, we outline a way of combining object oriented programming with the under-exploited hardware security mechanisms provided by the Intel 80286+ processor family to provide additional integrity for such programs and to assist with program debugging. The hardware protection mechanisms which provide process isolation are used in this work at a lower level of granularity to isolate the objects that exist within a process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armstrong J.C.: Leak detector shoot-out, in Advanced Systems, October (1994) 56–62. (www.parasoft.com/insure/info.insure.html)

    Google Scholar 

  2. Carrè B.: Reliable programming in standard languages, in High-integrity Software, (Sennett C.T., ed), Pitman Publishing, London, (1989).

    Google Scholar 

  3. Colwell R.P., Hitchcock C.Y., Jensen E.D., Sprunt H.M.B., Kollar C.P.: Computers, Complexity and Controversy, in Computer Vol 18, No 9 (1985).

    Google Scholar 

  4. Intel Corporation, Microprocessors, Volume 1, Intel Corporation, Mt Prospect, (1992).

    Google Scholar 

  5. Kahn, K.C., etal.: iMax: A Multiprocessor Operating System for an Object-Based Computer, Proceedings of the Eight Symposium on Operating Systems Principles, Pacific Grove, California, SIGOPS ACM, Vol.15 No.5, (1981).

    Google Scholar 

  6. Meyer, B.: Object-oriented Software Construction, Prentice Hall, Herfordshier, (1988).

    Google Scholar 

  7. Microsoft Corporation: Microsoft Windows Programmer's Reference Manual, Microsoft Press, Part No. PC 28915-0492.

    Google Scholar 

  8. Mohay, G., Caelli, W., Gough, K.J., Holford, J., Low, G.: CASS — Computer Architecture for Secure Systems, Proceedings of the Sixteenth Australian Computer Science Conference (ACSC-16), Brisbane, Queensland, ACS Communications, Vol 15 No 1, (1993) 253–263.

    Google Scholar 

  9. Nelson, T.: Finding Run-time Memory Errors, in DDJ Magazine, Vol 18, Issue 12 (1993).

    Google Scholar 

  10. Pure Software Inc.: Purify Data Sheet, www.mnl.com/pure/purify/PYdatasheet.html, (1995).

    Google Scholar 

  11. Szyperski, C., Gough, K.J., The Role of Programming Languages in the Life-Cycle of Safe Systems, Proceedings of the Safety through Quality Conference, NASA, Florida (1995).

    Google Scholar 

  12. Watson, G.: Debug Malloc Library Manual, Letters Corporation (1994).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Holford, J., Mohay, G. (1997). ProtectOS: Operating system and hardware support for small objects. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027918

Download citation

  • DOI: https://doi.org/10.1007/BFb0027918

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics