Penetrating an operating system: a study of VM/370 integrity

  • Authors:
  • C. R. Attanasio;P. W. Markstein;R. J. Phillips

  • Affiliations:
  • -;-;System Development Corporution, Santa Monica, California

  • Venue:
  • IBM Systems Journal
  • Year:
  • 1976

Quantified Score

Hi-index 0.00

Visualization

Abstract

Discussed is a methodology for discovering operating system design flaws as an approach to learning system design techniques that may make possible greater data security. Input/output has been found to be involved in most of the weaknesses discovered by a study team in a particular version of the system. Relative design simplicity was found to be the source of greatest protection against penetration efforts.