···11-#import "template.typ": *
22-33-44-#mol-chapter("Implementation")
55-66-77-88-#lorem(100)
99-1010-1111-1212-1313-// heavily inspired by the original twizzler paper / security paper
1414-//
1515-1616-1717-== Capabilities
1818-1919-2020-Capabilities are
2121-2222-2323-=== Gates
2424-2525-// talk about what gates can be useful for
2626-//
2727-// their design
2828-//
2929-// whateva
3030-3131-=== Flags
3232-3333-//
3434-// How they can be used to specify how the signature is formed
3535-3636-=== Signature
3737-3838-// verification from the whateva
3939-4040-== Security Contexts
4141-// what is it?
4242-// its an object in its own right!
4343-//
4444-// a process must be attached to one, in order to store any capabilities
4545-//
4646-// what about the "detachable bit?" jail?
4747-//
4848-// what else
4949-5050-5151-5252-== Key Pairs
5353-5454-// the desgin of the keypair objects
5555-//
5656-// the design of the keys themselves
5757-//
5858-// how they can be used to sign multiple objects (compartmentalization)
5959-//
6060-6161-6262-6363-6464-6565-#load-bib(read("refs.bib"))
+23
2-keypair.typ
···11+#import "template.typ": *
22+33+44+#mol-chapter("Key Pairs")
55+66+// what are keypair objects ?
77+88+// how are they represented in twizzler ?
99+1010+== Abstraction
1111+1212+// the abstraction layer to represent multiple signing schemes
1313+1414+1515+== Compartmentalization
1616+// how they can be used to sign multiple objects (compartmentalization)
1717+//
1818+1919+2020+2121+2222+2323+#load-bib(read("refs.bib"))
+16
3-cap.typ
···11+#import "template.typ": *
22+33+#mol-chapter("Capabilities")
44+55+66+// define a capability
77+88+// the atomic unit of security
99+1010+== Gates
1111+1212+== Flags
1313+1414+== Signature
1515+1616+#load-bib(read("refs.bib"))
···11+#import "template.typ": *
22+33+#mol-chapter("Security Contexts")
44+55+66+== Map
77+// on disk storage for security contexts for efficient lookup
88+99+1010+// what else is special about security contexts?
1111+1212+1313+#load-bib(read("refs.bib"))
thesis.pdf
This is a binary file and will not be displayed.
+7-11
thesis.typ
···33#show: mol-thesis
445566-// what am i even supposed to write about maneeee
77-//
88-// what have i even done
99-//
1010-// am i a fraud
1111-//
1212-//
136147#mol-titlepage(
1515- title: "Design, Implementation, and Verification of a Security System for Data-Centric Operating Systems",
88+ // title: "Design, Implementation, and Verification of a Security System for Data-Centric Operating Systems",
99+ title: "Twizzler-Security\nA Capability-Based Security System for Twizzler",
1610 // title: "Gurt",
1711 author: "Surendra Jammishetti",
1812 birth-date: "April 1st, 1980",
···52465347#outline()
5448#include "1-introduction.typ"
5555-#include "2-implementation.typ"
5656-#include "3-results.typ"
5757-#include "4-conclusion.typ"
4949+#include "2-keypair.typ"
5050+#include "3-cap.typ"
5151+#include "4-secctx.typ"
5252+#include "5-results.typ"
5353+#include "6-conclusion.typ"
5854#pagebreak()
59556056#load-bib(read("refs.bib"), main: true)