Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Zephyr and Fuchsia
What is Zephyr?
Zephyr: In the beginning
Zephyr: Motivation for OS protections
Zephyr: Hardware Limitations . Most microcontrollers back a MMU
Zephyr: Protection Design Constraints
Zephyr: Basic Memory Protections
Zephyr: Userspace Support
Zephyr: Userspace Memory Model
Zephyr: Userspace Kernel Interface
Zephyr: Application Memory
Zephyr: App Shared Memory Example
Zephyr: Areas for Future Work
Fuchsia Security Mechanisms
Fuchsia: (Regular) Handles
Fuchsia: Resource Handles
Fuchsia: Job Policy
Fuchsia: Namespaces and Sandboxing
Fuchsia: Bootstrap / Process Creation
Fuchsia: A Case for MAC
Fuchsia & MAC: Design Options
Full Kernel Support for MAC
Current Work - Examples
Fuchsia vs Linux OS security
Questions?
Taught by
Linux Foundation
Tags
Related Courses
Cloud Application SecurityUniversity of Minnesota via Coursera Cybersecurity Awareness: Social Engineering
LinkedIn Learning Ethical Hacking: The Complete Malware Analysis Process
LinkedIn Learning iOS Development: Security
LinkedIn Learning Securing the Use of Generative AI in Your Organization
LinkedIn Learning