Abstract
The Computer Architecture for Secure Systems (CASS) project has developed an architecture and tools to ensure the security and integrity of software in distributed systems. In this paper, we outline a way of combining object oriented programming with the under-exploited hardware security mechanisms provided by the Intel 80286+ processor family to provide additional integrity for such programs and to assist with program debugging. The hardware protection mechanisms which provide process isolation are used in this work at a lower level of granularity to isolate the objects that exist within a process.
Preview
Unable to display preview. Download preview PDF.
References
Armstrong J.C.: Leak detector shoot-out, in Advanced Systems, October (1994) 56–62. (www.parasoft.com/insure/info.insure.html)
Carrè B.: Reliable programming in standard languages, in High-integrity Software, (Sennett C.T., ed), Pitman Publishing, London, (1989).
Colwell R.P., Hitchcock C.Y., Jensen E.D., Sprunt H.M.B., Kollar C.P.: Computers, Complexity and Controversy, in Computer Vol 18, No 9 (1985).
Intel Corporation, Microprocessors, Volume 1, Intel Corporation, Mt Prospect, (1992).
Kahn, K.C., etal.: iMax: A Multiprocessor Operating System for an Object-Based Computer, Proceedings of the Eight Symposium on Operating Systems Principles, Pacific Grove, California, SIGOPS ACM, Vol.15 No.5, (1981).
Meyer, B.: Object-oriented Software Construction, Prentice Hall, Herfordshier, (1988).
Microsoft Corporation: Microsoft Windows Programmer's Reference Manual, Microsoft Press, Part No. PC 28915-0492.
Mohay, G., Caelli, W., Gough, K.J., Holford, J., Low, G.: CASS — Computer Architecture for Secure Systems, Proceedings of the Sixteenth Australian Computer Science Conference (ACSC-16), Brisbane, Queensland, ACS Communications, Vol 15 No 1, (1993) 253–263.
Nelson, T.: Finding Run-time Memory Errors, in DDJ Magazine, Vol 18, Issue 12 (1993).
Pure Software Inc.: Purify Data Sheet, www.mnl.com/pure/purify/PYdatasheet.html, (1995).
Szyperski, C., Gough, K.J., The Role of Programming Languages in the Life-Cycle of Safe Systems, Proceedings of the Safety through Quality Conference, NASA, Florida (1995).
Watson, G.: Debug Malloc Library Manual, Letters Corporation (1994).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Holford, J., Mohay, G. (1997). ProtectOS: Operating system and hardware support for small objects. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027918
Download citation
DOI: https://doi.org/10.1007/BFb0027918
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive