Frequently Asked Questions
  • Register

Have questions? We have answers!

  • What is the System Call Access Verification Process?

    When a process in the PBS system tries to invoke a system call, an access verification routine is followed before granting access for the process to the system call.

    There are certain system calls that require a process to perform an action (e.g. Reboot, Set Time). In such cases, PBS checks if the calling process has appropriate PBS-specific access rights to perform that action.

    Other system calls require the process to perform an operation on a file (e.g., Create, Delete, Write files or Mount). In these cases PBS performs several tests. First, it checks the validity of the file name and path name, and whether it already exists. It also checks whether the process has the appropriate access rights for that particular file. For example, if a process issues the system call mount(fd0, “/home/user”), PBS first checks if fd0 is a valid device and if “/home/user” is a valid path. Second, it checks if the process has appropriate mount access rights PBS_MOUNT_DEV for the device “fd0” and PBS_MOUNT_PATH for the path “/home/user.” If any of these tests fail, the system call is disallowed. Thus, the access to any system resource is highly restricted and guarded. Because of the heavily layered security built into PBS it is essentially impossible for an attacker to cause damage.

    SAGE Fisrt Logo

    Created on 12/17/2012 in SAGE First FAQs

    Was this helpful?

Secure Web Server Appliance


  • Pre-configured with Web, email and FTP servers
  • Secure Remote Administration
  • Process-Based Built-in Security Policy
  • Worry-free maintenance
  • Hardened Operating System
  • Supports SSL, SSI, PHP, PERL PYTHON, & TCL
  • Supports MY SQL, PostgreSQL and SQL Libraries
  • Multi-domain Hosting, Virtual IP
  • Backup

Industrial Automation Firewall

Firewall AD Graphic


  • Mac Address Limiting
  • Port Management
  • Detection and Rejections of DOS Attacks
  • Protection from Viruses, Trojans and Common Cyber Attacks
  • Secure Your Ethernet Enabled Control System Devices (PLCs, RTUs, IEDs)
  • Physically Hardened
  • Secure, Cyber-Hardened Operating System
  • Protect Your End Devices Against Viruses, Worms, Trojans, Malware and Common Cyber Penetration Attacks
  • Transparent In-Line PLC Firewall and Communications Filter


Process-Based Security

PBS Ad Graphic