1 / 8

Chromium OS

Chromium OS. Chase Rogers. User Interface. Unobtrusive Use small amount of screen space Combine apps and web pages into one tab strip Floating Windows Search as a primary form of navigation Web applications with the functionality of desktop applications. Architecture. 3 Major Components

parry
Download Presentation

Chromium OS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chromium OS Chase Rogers

  2. User Interface Unobtrusive Use small amount of screen space Combine apps and web pages into one tab strip Floating Windows Search as a primary form of navigation Web applications with the functionality of desktop applications

  3. Architecture • 3 Major Components • Chromium-based browser and window manager • System-level software and user-land services • Firmware • Kernel-mostly stock • Patched to improve boot performance • Only services that are absolutely critical are running

  4. Designed to make booting faster and more secure • Implements: • System recovery: The recovery firmware can re-install Chromium OS in the even that the system has become corrupt or compromised. • Verified boot: Each time the system boots, Chromium OS verifies that the firmware, kernel, and system image have not been tampered with or become corrupt. This process starts in the firmware. • Fast boot: Improved boot performance by removing a lot of complexity that is normally found in PC firmware.

  5. Security • Four principals • The perfect is the enemy of the good • Deploy defenses in depth • Make devices secure by default • Don’t scapegoat users

  6. Perfect is the enemy of the good • No security solution is ever perfect • Mistakes will be made • There will be unforeseen interactions • Cannot let this prevent the release of something very good • Deploy defenses in depth • Use variety of defenses to act as stumbling blocks for the attacker • Assume the attacker will still get in • Have another layer of defenses in place to prevent turning a user account compromise into a root or kernel exploit • Prevent attacker from adding an account, installing services, or re-compromising system after reboot

  7. Make it secure by default • Being safe is not an advanced or optional feature. • Advantage of knowing which software should be running on the device at all times • Better able to deploy solutions that leave the user’s machine humming along nicely • Don’t scapegoat users • People assess their risk all the time • It is difficult to make accurate judgments about one’s level of risk • It is not the users’ fault • Require users to only make decisions about things they comprehend • Fail-safe is they don’t understand a choice and just want to click and make it go away

  8. Google Chrome OS

More Related