Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Zephyr and Fuchsia
What is Zephyr?
Zephyr: In the beginning
Zephyr: Motivation for OS protections
Zephyr: Hardware Limitations . Most microcontrollers back a MMU
Zephyr: Protection Design Constraints
Zephyr: Basic Memory Protections
Zephyr: Userspace Support
Zephyr: Userspace Memory Model
Zephyr: Userspace Kernel Interface
Zephyr: Application Memory
Zephyr: App Shared Memory Example
Zephyr: Areas for Future Work
Fuchsia Security Mechanisms
Fuchsia: (Regular) Handles
Fuchsia: Resource Handles
Fuchsia: Job Policy
Fuchsia: Namespaces and Sandboxing
Fuchsia: Bootstrap / Process Creation
Fuchsia: A Case for MAC
Fuchsia & MAC: Design Options
Full Kernel Support for MAC
Current Work - Examples
Fuchsia vs Linux OS security
Questions?
Taught by
Linux Foundation
Tags
Related Courses
Introduction to Enterprise ComputingMarist College via Independent Advanced Operating Systems
Georgia Institute of Technology via Udacity Programmation sur iPhone et iPad (partie I)
Université Pierre et Marie CURIE via France Université Numerique 操作系统原理(Operating Systems)
Peking University via Coursera Introduction to Operating Systems
Georgia Institute of Technology via Udacity