Zephyr: Hardware Limitations . Most microcontrollers back a MMU
7
Zephyr: Protection Design Constraints
8
Zephyr: Basic Memory Protections
9
Zephyr: Userspace Support
10
Zephyr: Userspace Memory Model
11
Zephyr: Userspace Kernel Interface
12
Zephyr: Application Memory
13
Zephyr: App Shared Memory Example
14
Zephyr: Areas for Future Work
15
Fuchsia Security Mechanisms
16
Fuchsia: (Regular) Handles
17
Fuchsia: Resource Handles
18
Fuchsia: Job Policy
19
Fuchsia: Namespaces and Sandboxing
20
Fuchsia: Bootstrap / Process Creation
21
Fuchsia: A Case for MAC
22
Fuchsia & MAC: Design Options
23
Full Kernel Support for MAC
24
Current Work - Examples
25
Fuchsia vs Linux OS security
26
Questions?
Description:
Explore the security architectures and mechanisms of Zephyr and Fuchsia operating systems in this informative conference talk by Stephen Smalley and James Carter from the National Security Agency. Delve into the unique approaches these emerging open-source systems take compared to Linux, with Zephyr targeting resource-constrained IoT devices and Fuchsia employing a capability-based microkernel for more capable devices. Learn about ongoing efforts to enhance their security features, and gain insights into how they compare to Linux and Android. Discover Zephyr's evolution from its beginnings to its current implementation of OS protections, userspace support, and memory model, as well as areas for future development. Examine Fuchsia's security mechanisms, including handles, job policies, namespaces, and sandboxing, while considering the potential for mandatory access control (MAC) implementation. Compare these systems to Linux OS security and engage with the speakers' expertise through a Q&A session.
Read more
Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems