SECURITY SURVEY OF FAMOUS OPERATING SYSTEMS

As the computer industry advanced so much and it has more complexities, Operating System responsibilities has increased, and give challenge to the operating system developers to build a secure operating system. In this paper we will see operating system security issues computer industry has faced in desktop and mobile area. And we are proposing a general idea to improve all operating systems for security.

[1]  Alan L. Cox,et al.  Achieving 10 Gb/s using safe and transparent network interface virtualization , 2009, VEE '09.

[2]  Qing Li,et al.  Mobile Security: A Look Ahead , 2013, IEEE Security & Privacy.

[3]  Jiuxing Liu Evaluating standard-based self-virtualizing devices: A performance study on 10 GbE NICs with SR-IOV support , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).

[4]  Srilatha Manne,et al.  Accelerating two-dimensional page walks for virtualized systems , 2008, ASPLOS.

[5]  Muli Ben-Yehuda,et al.  Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines , 2008 .

[6]  Jimi Xenidis,et al.  Utilizing IOMMUs for Virtualization in Linux and Xen Muli , 2006 .

[7]  Stefan Götz,et al.  Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines , 2004, OSDI.

[8]  Rusty Russell,et al.  virtio: towards a de-facto standard for virtual I/O devices , 2008, OPSR.

[9]  Beng-Hong Lim,et al.  Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.

[10]  Aloysius K. Mok,et al.  Real-Time Virtual Resource: A Timely Abstraction for Embedded Systems , 2002, EMSOFT.

[11]  Rosilah Hassan,et al.  Comparison between android and iOS Operating System in terms of security , 2013, 2013 8th International Conference on Information Technology in Asia (CITA).

[12]  R. Hassan,et al.  A network device simulator in android platform , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[13]  Robert P. Goldberg,et al.  Survey of virtual machine research , 1974, Computer.