Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems

Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems

Linux Foundation via YouTube Direct link

Intro

1 of 26

1 of 26

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Zephyr and Fuchsia
  3. 3 What is Zephyr?
  4. 4 Zephyr: In the beginning
  5. 5 Zephyr: Motivation for OS protections
  6. 6 Zephyr: Hardware Limitations . Most microcontrollers back a MMU
  7. 7 Zephyr: Protection Design Constraints
  8. 8 Zephyr: Basic Memory Protections
  9. 9 Zephyr: Userspace Support
  10. 10 Zephyr: Userspace Memory Model
  11. 11 Zephyr: Userspace Kernel Interface
  12. 12 Zephyr: Application Memory
  13. 13 Zephyr: App Shared Memory Example
  14. 14 Zephyr: Areas for Future Work
  15. 15 Fuchsia Security Mechanisms
  16. 16 Fuchsia: (Regular) Handles
  17. 17 Fuchsia: Resource Handles
  18. 18 Fuchsia: Job Policy
  19. 19 Fuchsia: Namespaces and Sandboxing
  20. 20 Fuchsia: Bootstrap / Process Creation
  21. 21 Fuchsia: A Case for MAC
  22. 22 Fuchsia & MAC: Design Options
  23. 23 Full Kernel Support for MAC
  24. 24 Current Work - Examples
  25. 25 Fuchsia vs Linux OS security
  26. 26 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.