Security kernels

  • Authors:
  • Steven B. Lipner;William A. Wulf;Roger R. Schell;Gerald J. Popek;Peter G. Neumann;Clark Weissman;Theodore A. Linden

  • Affiliations:
  • The Mitre Corporation;Carnegie-Mellon University;United States Air Force;University of California;SRI Computer Science Group;System Development Corporation;-

  • Venue:
  • AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
  • Year:
  • 1974

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent experience in computer security has illustrated the susceptibility of numerous operating systems to hostile penetration. Successful penetrations have been directed at manufacturers' conventional operating systems as well as special "secure" versions that have been the subjects of exhaustive efforts to find and fix all potential security problems. While formal reports are understandably hard to come by, it appears that the effort required to "break" any operating system and obtain access to any information it stores (at any time and without detection) is in the range two to four man-months. In contrast, the effort expended in futile attempts to prevent such penetration may be as much as two orders of magnitude greater (several man-years or more).