Penetrating an Operating System: A Study of VM/370 Integrity

Discussed is a methodology for discovering operating system design flaws as an approach to learning system design techniques that may make possible greater data security. Input/output has been found to be involved in most of the weaknesses discovered by a study team in a particular version of the system. Relative design simplicity was found to be the source of greatest protection against penetration efforts.