Malicious Process Conscious Operating Systems (MPCOS)
dc.contributor.advisor | Libsie, Mulugeta (PhD) | |
dc.contributor.author | Lemma, Dagmawi | |
dc.date.accessioned | 2018-06-18T08:02:40Z | |
dc.date.accessioned | 2023-11-29T04:06:43Z | |
dc.date.available | 2018-06-18T08:02:40Z | |
dc.date.available | 2023-11-29T04:06:43Z | |
dc.date.issued | 2008-10 | |
dc.description.abstract | Additional principle of operating system is presented in this paper towards making the operating system malicious activity conscious. In addition to the existing principles of modern operating systems that mainly focus on resource management and user management, we proposed operating systems should follow principles of preventing malicious code. Exploiting the fact that malicious code/programs still require services from the operating system that is provided via system call, we hypothesized and demonstrated that the operating system is the ideal location where malicious code prevention is made. Since computer security has a human element as well, in our approach we followed control of malicious activity by forcing them to run with the consent of the user. We also suggested a mechanism of pre-evaluation of programs to categories them as trusted or not. The suggested mechanism uses a lookup file called TALF which consist list of known or trusted application. The operating system thereby consults the TALF prior to letting any application run on the machine. Each application in the TALF is identified by a locally unique identifier – TAID. In line with TALF, an alert system is proposed to bring program execution to the consent of the user. | en_US |
dc.identifier.uri | http://etd.aau.edu.et/handle/123456789/1193 | |
dc.language.iso | en | en_US |
dc.publisher | Addis Ababa University | en_US |
dc.subject | Conscious; Operating; Systems | en_US |
dc.title | Malicious Process Conscious Operating Systems (MPCOS) | en_US |
dc.type | Thesis | en_US |