Completed
Zephyr: Protection Design Constraints
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security in Zephyr and Fuchsia - Comparing Emerging Open Source Operating Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Zephyr and Fuchsia
- 3 What is Zephyr?
- 4 Zephyr: In the beginning
- 5 Zephyr: Motivation for OS protections
- 6 Zephyr: Hardware Limitations . Most microcontrollers back a MMU
- 7 Zephyr: Protection Design Constraints
- 8 Zephyr: Basic Memory Protections
- 9 Zephyr: Userspace Support
- 10 Zephyr: Userspace Memory Model
- 11 Zephyr: Userspace Kernel Interface
- 12 Zephyr: Application Memory
- 13 Zephyr: App Shared Memory Example
- 14 Zephyr: Areas for Future Work
- 15 Fuchsia Security Mechanisms
- 16 Fuchsia: (Regular) Handles
- 17 Fuchsia: Resource Handles
- 18 Fuchsia: Job Policy
- 19 Fuchsia: Namespaces and Sandboxing
- 20 Fuchsia: Bootstrap / Process Creation
- 21 Fuchsia: A Case for MAC
- 22 Fuchsia & MAC: Design Options
- 23 Full Kernel Support for MAC
- 24 Current Work - Examples
- 25 Fuchsia vs Linux OS security
- 26 Questions?