Operating system rhis is a poster poster.pdf

deoreg1386 1 views 1 slides Oct 27, 2025
Slide 1
Slide 1 of 1
Slide 1
1

About This Presentation

Operating system rhis is a poster poster


Slide Content

Research Gap:
Limited hybrid policy integration.
Lack of standard verification methods.
Security–performance imbalance.
Minimal AI and blockchain adoption.
Review of Modern Architectures and
Mechanisms for Operating System
Security
Abstract
This study reviews modern
operating system security
architectures and mechanisms
focusing on access control,
kernel protection, and trusted
hardware integration to
enhance system reliability and
defense against evolving
threats.
Objective
To study and compare modern OS
security frameworks and
architectures.
To analyze access control models
like DAC, MAC, RBAC, and DTE.
To evaluate kernel-level
mechanisms such as LSM, TPM,
and System Call Interposition.
To identify challenges and
emerging trends in OS security.
Scope of Study
Focuses on OS security across COTS, mobile, IoT, and robotic systems.
Emphasizes kernel-level and architecture-based protection.
Explores hardware-based trust mechanisms like TPM.
Studies hybrid security frameworks for flexibility and resilience.
Aims to strengthen integrity, confidentiality, and performance balance.
Future Scope
AI-based predictive threat detection.
Blockchain-enabled secure frameworks.
Adaptive multi-policy OS security systems.
Formal verification of kernel architecture.
Enhanced resilience for IoT and robotics.
Authors
Kirtesh gadilohar
Mayur wagh
Ronak agrawal
Department of Computer Engineering
SVKM's NMIMS MPSTME, Shirpur,
Dhule, Maharashtra, India
[email protected]
[email protected]
[email protected]
Affiliations
Prof. Sachin Bhandari
Department of Computer
Enginnering
SVKM's NMIMS MPSTME,
Shirpur, Dhule, Maharashtra, India
[email protected]
Conclusion
Modern OS security is evolving toward hybrid,
hardware-assisted, and AI-driven frameworks that
strengthen protection, maintain performance, and
ensure resilience across diverse computing
environments.
Results
LSM and TPM boost system trust.
Multi-policy improves protection.
Testing detects vulnerabilities.
Hardware ensures data integrity.
FUTURE GOAL
AI_AND_BLOCKCHAIN INTEGRATION RESILENT, ADAPTIVE SECURITY
FRAMEWORKS
Tags