article
Free Access

A secure networked laboratory for kernel programming

Authors Info & Claims
Published:01 August 1998Publication History
Skip Abstract Section

Abstract

Recently, several flavours of UNIX have appeared which run on inexpensive personal computers. Further, the source code for these operating systems is freely available. This makes offering courses that include realistic kernel programming feasible in an academic environment. However, root access is required in order to modify a system's kernel. This poses a potential security threat both to other systems on the network and to other users of a single machine. This paper presents a lab design which securely integrates machines with untrusted users acting as root into a secured network, and which securely allows multiple users root access to the same machine.

References

  1. 1 Chapman, R., and Carlisle, W. H. A linux-based lab for operating systems and network courses. The Linux Journal, 41 (September 1997), 60-65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Kaplenk, J. Using linux to teach UNIX systems administration. The Linux Journal, 44 (December 1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Mayo, J., and Kearns, P. A secure-networked laboratory for kernel programming. Technical Report TR97--1, Department of Computer Science, College of William and Mary, September 1997.Google ScholarGoogle Scholar
  4. 4 Sherman, M., and Marks, A. Using low-cost workstations to investigate computer networks and distributed systems. Technical Report PCS-TR86-126, Dartmouth College, Computer Science, Hanover, NH, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Ylonen, T. Ssh- secure login connections over the internet, in 6th USENIX Security Symposium (July 1996), USENIX Association, 37-42. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A secure networked laboratory for kernel programming

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM SIGCSE Bulletin
              ACM SIGCSE Bulletin  Volume 30, Issue 3
              Sept. 1998
              313 pages
              ISSN:0097-8418
              DOI:10.1145/290320
              Issue’s Table of Contents
              • cover image ACM Conferences
                ITiCSE '98: Proceedings of the 6th annual conference on the teaching of computing and the 3rd annual conference on Integrating technology into computer science education: Changing the delivery of computer science education
                August 1998
                315 pages
                ISBN:1581130007
                DOI:10.1145/282991

              Copyright © 1998 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 August 1998

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!