<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-23T17:50:35Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-198277</identifier><datestamp>2024-12-23T18:01:48Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>198277</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.2.N.198277</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
          <dc:rights>All Rights Reserved</dc:rights>
                  <dc:date>2024</dc:date>
                  <dc:format>68 pages</dc:format>
                  <dc:type>Masters Thesis</dc:type>
          <dc:type>Academic theses</dc:type>
          <dc:type>Text</dc:type>
                  <dc:language>eng</dc:language>
                  <dc:contributor>Moore, Peter</dc:contributor>
          <dc:contributor>Kinsy, Michel</dc:contributor>
          <dc:contributor>Ahmad, Adil</dc:contributor>
          <dc:contributor>Andrade, Dhiego</dc:contributor>
          <dc:contributor>Arizona State University</dc:contributor>
                  <dc:description>Partial requirement for: M.S., Arizona State University, 2024</dc:description>
          <dc:description>Field of study: Computer Science</dc:description>
          <dc:description>Memory safety is one of the most important issues in software today. It encompasses a wide range of security vulnerabilities, including several that are consistently ranked highly in MITRE’s list of the most dangerous software weakness (2023). These vulnerabilities have been documented and fought against since at least 1972 (Meer et al., 2010). However, previous solutions have failed to prevent memory corruption attacks because they fail to address the underlying structural issues with how we access memory (Saito et al., 2016). In A Path Toward Secure and Measurable Software, the White House’s Office of the National Cyber Director described reducing memory safety vulnerabilities at scale as an important ”fundamental shift” (2024). Capabilities represent such a fundamental shift in how memory is accessed. A capability architecture can provide guarantees about memory safety by checking an unforgeable access token on every memory access. This ensures that every actor accessing a memory location is either the owner of the location or has received permission from the owner to perform that access. 
In order to ensure that the security guarantees provided by capabilities are held throughout the software stack, a capability-aware ecosystem is needed. One vital piece of any such ecosystem is an operating system. The OS is responsible for managing all the hardware and software in a system. As such, the OS must have a great amount of control over the system’s hardware and software. Capabilities provide a higher degree of control than is currently possible.
This dissertation proposes a capability-aware operating system, and analyzes the work needed to harden and optimize such a system. It describes the various roles of the modern OS, and investigates how those roles might be changed by capabilities. Finally, it discusses ZenOS, an implementation of and foundation for a capability-aware OS that has been designed RISC-V non-atomic capabilities.</dc:description>
                  <dc:subject>Computer Science</dc:subject>
          <dc:subject>Capabilities</dc:subject>
          <dc:subject>Memory Safety</dc:subject>
          <dc:subject>Operating System</dc:subject>
                  <dc:title>Capability-Aware Operating System Design and ZenOS</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
