SECURITY ARCHITECTURES CARSTEN WEINHOLD
|
|
- Morgan Watkins
- 6 years ago
- Views:
Transcription
1 Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD
2 MOTIVATION Common observations: Complex software has security bugs Users are plagued by malware User PCs become bots Critical data gets stolen Targeted attacks at high-value users: Industry, governments, NGOs,... Snowdon told us how bad it really is!!2
3 MOTIVATION It s all the same for mobile devices Malware in Android Store: trojan horse downloaded by millions of users Security-critical bugs: Drivers [1,2], USB stacks [7], boot loaders Messaging apps [8], web browser,... Jailbreaking = attack on security: Requires physical access or visit special website [9]!3
4 CLASSICAL ARCHITECTURES!4
5 ISOLATION Isolation in commodity OSes based on user accounts: Same privileges for all apps Permissive interfaces (e.g., ptrace to manipulate other address spaces) No isolation within applications Efforts to restrict privileges: SELinux, AppArmor, Seatbelt,...!5
6 HW ISOLATION Separate computers PC 1 PC 2 Applications and data physically isolated App Effective, but... App High costs Needs more space Inconvenient Exposure to network may pose threat OS Hardware OS Hardware!6
7 VM ISOLATION Multiple VMs, OSes VM 1 VM 2 Isolation enforced by virtualization layer App Saves space, energy, App maintenance effort But still... OS OS Switching between VMs is inconvenient Even more code Virtualization Layer Hardware!7
8 ARE WE SECURE? Huge code bases remain Applications still the same Many targets to attack: Applications, libraries, commodity OSes Virus scanner, firewall,... Virtualization layer High overhead for many VMs!8
9 SECURITY ARCHITECTURES!9
10 SECURITY GOALS Protect the user s data Secure applications that process data Acknowledge different kinds of trust: Application A trusted to handle its own data, but not the files of application B OS trusted to store data, but not to see it Identify and secure TCB: the Trusted Computing Base!10
11 FIRST STEP To improve security: Reduce size of TCB = smaller attack surface First idea: Remove huge legacy OS from TCB Port application to microkernel-based multiserver OS Remove unneeded libc backends, etc. Possible approaches discussed in lecture on Legacy Reuse!11
12 NIZZA ARCHITECTURE Legacy App Legacy OS Signing App E-Commerce App Banking App Loader Names User Auth GUI Storage I/O Microkernel!12
13 PRINCIPLES Nizza architecture: fundamental concepts: Strong isolation Application-specific TCBs Legacy reuse Trusted wrappers Trusted computing!13
14 APP-SPECIFIC TCB Reflects Principle of Least Privilege TCB of an application includes only components its security relies upon TCB does not include unrelated applications, services, libraries Mechanisms: Address spaces, IPC control for isolation Well-defined interfaces!14
15 APP-SPECIFIC TCB Network App Legacy App IP Stack Signing App Legacy OS Virtual Ethernet Key Mgmt Loader Names User Auth GUI Storage I/O Microkernel!15
16 SPLITTING COMPONENTS!16
17 SPLIT APPS Problems with porting applications: Dependencies need to be satisfied Can be complex, require lots of code Stripped down applications may lack functionality / usability Better idea: split application Make only security-critical parts run on microkernel-based OS Parts of application removed from TCB!17
18 EXAMPLE: Digitally signed s, what s critical? Handling of signature keys Requesting passphrase to unlock secret signature key Presenting message: Before sending: What You See Is What You Sign After receiving: verify signature, identify sender!18
19 SPLIT APP Mozilla Thunderbird GnuPG Proxy L4GnuPG X Window System L 4 Linux DOpE Nitpicker Trusted computing base Hardware Video Device Input Devices Figure taken from [5]!19
20 TCB REDUCTION 1,500,000+ SLOC no longer in TCB: Linux kernel, drivers, X-Server C and GUI libraries, Thunderbird TCB size reduced to ~150,000 SLOC: GNU Privacy Guard, viewer Basic L4 system At least 10 times less code in TCB!20
21 SPLITTING THE OS Splitting works for applications What about the complex and useful infrastructure of commodity OSes? Drivers (see previous lectures) Protocol stacks (e.g., TCP/IP) File systems Starting point: Virtualized commodity OS!21
22 SIMPLE REUSE Run legacy OS in VM Reuse service: net, files,... Legacy infrastructure isolated from applications App Legacy OS But: Applications still depend on legacy services... in TCB? Interfaces reused, security issues as well? Basic Services Microkernel!22
23 COMPLEXITY Network and file system stacks are virtually essential subsystems Generally well tested Ready for production use... but not bug free: month of Kernel Bugs 2006 [1,2]: 14 exploitable flaws in file systems: UFS, ISO 9660, Ext3, SquashFS,... WiFi drivers: remotely exploitable bugs!23
24 REUSE + TRUST Complex protocol stacks should not be part of TCB (for confidentiality + integrity) Reuse untrusted infrastructure through trusted wrapper: Add security around existing APIs Cryptography Additional checks (may require redundant data structures, if original data cannot be trusted) General idea similar to SSL, VPN!24
25 EXAMPLE: VPN VPN: Confidentiality, Integrity, Availability Secure Net Internet Secure Net!25
26 SINA BOX SINA box used by German BSI : VPN gateway Implements IPSec & PKI Intrusion detection & response Used for secure access to government networks, e.g. in German embassies Image source:
27 SINA BOX Hardware: Differently trusted network interfaces: Red: Black: plaintext, no protection encrypted, MACs Tamper / EM protected casing Software: Minimized and hardened Linux Runs only from CD-ROM or Flash!27
28 OS COMPLEXITY Linux is complex! SLOC for Linux : Architecture specific: 817,880 x86 specific: 55,463 Drivers: 2,365,256 Common: 1,800,587 Typical config: ~ 2,000,000 Minimized & hardened: ~ 500,000!28
29 MIKRO-SINA Research project Mikro-SINA Goals: Reduce TCB of VPN gateway Enable high-level evaluation for high assurance scenarios Ensure confidentiality and integrity of sensitive data within the VPN Exploit microkernel architecture!29
30 IPSEC BASICS Protocol suite for securing IPbased communication Authentication header (AH) Integrity Authentication Encapsulating Security Payload (ESP) Confidentiality Application TCP / UDP IP IPSec Link Layer Tunnel mode / transport mode!30
31 IPSEC IN L 4 LINUX IPSec is security critical component... but is integrated into Linux kernel L 4 Linux IP Stack IPSec Microkernel!31
32 IPSEC VIADUCT Better: isolate IPSec in Viaduct IPSec packets sent/received through TUN/ TAP device L 4 Linux IP Stack tun0 eth0 IPSec Viaduct Microkernel!32
33 FRAGMENTATION Problem: Routers can fragment IPSec packets on the way Let L 4 Linux reassemble them L 4 Linux IP Stack AH / ESP tun0 eth0 IPSec Viaduct Microkernel!33
34 CONFIDENTIALITY Untrusted L 4 Linux must not see both plaintext and encrypted data Dedicated L 4 Linux for black/red networks L 4 Linux L 4 Linux IP Stack AH / ESP tun0 IPSec Viaduct tun0 IP Stack eth0 eth1 Microkernel!34
35 MIKRO-SINA Result: trusted wrapper for VPN Small TCB (see [6] for details): 5,000 SLOC for Viaduct Fine grain isolation Principle of least privilege Extensive reuse of legacy code: Drivers IP stack!35
36 EXAMPLE: STORAGE How to provide secure and Legacy App reliable storage for trusted applications? Legacy OS Signing App E-Commerce App Banking App Loader Names User Auth GUI Storage I/O Microkernel!36
37 VIRTUAL PRIVATE... VPFS: VPN: Confidentiality, Integrity, Availability TCB 4,600 SLOC Secure Secure Net File System App Commodity File Internet Secure System File System Helper Linux Kernel!!! Secure Net 50,000+ SLOC Microkernel See [3] for details!37
38 VPFS STACK Signing App Secure File System Office App Secure File System Banking App Secure File System Secure File System Proxy Secure File System Proxy Secure File System Proxy Commodity File System Isolate applications and their private storage: configure communication capabilities such that each application can access its private instance of the secure file system exclusively!38
39 SECURITY GOALS Confidentiality: only authorized applications can access file system, all untrusted software cannot get any useful information Integrity: all data and meta data is correct, complete, and up to date; otherwise report integrity error Recoverability: damaged data in untrusted file system can be recovered from trusted backup!39
40 POPULAR SOLUTIONS App VFS File System File-level protection CFS Cryptographic File System for UNIX EFS Microsoft Encrypting File System ecryptfs Linux kernel support + tools EncFS Based on FUSE Buffer Cache Block Layer Disk Driver Storage Device Volume-level protection TrueCrypt, Filevault 2 dm_crypt Bitlocker Encrypted volumes in smartphones, etc.!40
41 DESIGN OPTIONS First end of design space: Protect whole file system at block layer: App VFS Transparent encryption of all data and metadata Block-level integrity??? Most parts of file system stack are part of TCB Attack surface still big File System Buffer Cache Block Layer Protection Disk Driver!41
42 DESIGN OPTIONS Second end of design space: Protect individual files: Stacked file system Encryption of all data and some metadata (names, directories,...) More flexibility for integrity Most parts of file system stack not part of TCB Ideal for trusted wrapper App VFS Protection File System Buffer Cache Block Layer Disk Driver!42
43 TRUSTED WRAPPER Trusted (TCB) Untrusted Critical App File / Naming Abstraction Buffer Cache Persistency + AES / SHA-1 open, read, write, mmap, (readdir),... VPFS Helper VFS File System Buffer Cache Block Layer Disk Driver open, read, write, mmap, readdir,... alloc/free blocks, B + -trees, redundancy, consistency,... read/write blocks, partition tables,... SATA, command queuing, write barriers, power,... Carsten Weinhold!43
44 VPFS APPROACH Virtual Private File System (TCB) Hroot! Sealed Memory H M M M H H H D D D D D Reused Commodity File System (Untrusted) Encrypted files in commodity file system Merkle hash tree to detect tampering!44
45 VPFS APPROACH Trusted part of VPFS enforces security: Encryption / decryption on the fly Plaintext only in trusted buffer cache Files in untrusted commodity file system store encrypted blocks Hash tree protects integrity of complete file system Single hash of root node stored securely!45
46 MULTIPLE FILES Dir Dir Dir File File File File Inode File (w/ per-file hashes) Hroot! Sealed Memory!46
47 EXTENSIVE REUSE VPFS reuses Linux file system stack: Drivers, block device layer Optimizations (buffer cache, read ahead, write batching,...) Allocate / free disk storage for files Cooperation: proxy driver in L 4 Linux!47
48 PROXY DRIVER SHM Buffer!!! Notify Drv! (chardev)! SHM buffer: mmap!!! SHM Buffer!! L4Linux Kernel VPFS Helper Wait+Signal: read+write IRQ Setup Dataspace L4Linux Container Shared memory + Signaling: - Trigger Linux Irq, then unblock read() on chardev - Call write() on chardev, then trigger L4 App s IRQ - Encrypted blocks transferred via shared memory VPFS Core! SHM Buffer!48
49 VPFS SUMMARY Trusted wrappers for file systems work! VPFS is general purpose file system Significant reduction in code size: Untrusted Linux file system stack comprises 50,000+ SLOC VPFS adds 4,000 to 4,600 SLOC to application TCB [3] jvpfs adds another 350 SLOC for secure journaling to protect against crashes [4]!49
50 USER INTERFACES!50
51 SCREEN SHARING Isolated applications run in different domains of trust, but separate screens are inconvenient The Nitpicker solution [5]: Let all windows share the same screen but securely: Make windows & applications identifiable Prevent them from spying on each other: route input securely, no screenshots!51
52 CONCEPTS Views Buffers!52
53 HOW IT WORKS Views Buffers!53
54 NITPICKER IN ACTION!54
55 DEMO!55
56 SUMMARY Secure reuse of untrusted legacy infrastructure Split apps + OS services for smaller TCB Nizza secure system architecture: Strong isolation Application-specific TCBs Legacy Reuse Trusted Wrapper!56
57 COMING UP Next week, January 14th: Lecture on Android on L4 : Practical exercise, room E069 In two weeks, January 21st: Lecture on Trusted Computing Where does VPFS store its secrets? How to prevent tampering with stored data? How to trust in what Nitpicker shows on screen?!57
58 REFERENCES [1] [2] [3] Carsten Weinhold and Hermann Härtig, VPFS: Building a Virtual Private File System with a Small Trusted Computing Base, Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, April 2008, Glasgow, Scotland UK [4] Carsten Weinhold and Hermann Härtig, jvpfs: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components, Proceedings of the 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 2011 [5] Norman Feske and Christian Helmuth, A Nitpicker's guide to a minimal-complexity secure GUI, ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, 2005, Washington, DC, USA [6] Christian Helmuth, Alexander Warg, Norman Feske, Mikro-SINA - Hands-on Experiences with the Nizza Security Architecture, D.A.CH Security 2005, 2005, Darmstadt, Germany [7] [8] [9]
SECURITY ARCHITECTURES CARSTEN WEINHOLD
Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD MOTIVATION Common observations: Complex software has security bugs Users
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationjvpfs: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components
Department of Computer Science Institute of Systems Architecture, Operating Systems Group : Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components Carsten Weinhold, ermann
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More informationINFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD OVERVIEW Fundamental
More informationTerra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)
Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have
More informationVirtual Private Networks (VPN)
CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationOperating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.
Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using
More informationCS 416: Operating Systems Design April 22, 2015
Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Introduction to Trusted Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Summer Term 2017 Roadmap: Trusted Computing Motivation
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationLast time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control
Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating
More informationFaculty of Computer Science Institute for System Architecture, Operating Systems Group LEGACY REUSE CARSTEN WEINHOLD
Faculty of Computer Science Institute for System Architecture, Operating Systems Group LEGACY REUSE CARSTEN WEINHOLD THIS LECTURE... So far... Basic microkernel concepts Drivers, resource management Today:
More informationTERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004
TERRA Authored by: Garfinkel,, Pfaff, Chow, Rosenblum,, and Boneh A virtual machine-based platform for trusted computing Presented by: David Rager November 10, 2004 Why there exists a need Commodity OS
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationSoftware Vulnerability Assessment & Secure Storage
Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices
More informationNetwork Security - ISA 656 IPsec IPsec Key Management (IKE)
Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating
More informationFile Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb
File Encryption Steven M. Bellovin https://www.cs.columbia.edu/~smb Why Encrypt Files? Theft of files Theft of media Theft of computer Cloud storage? I.e. Someone else s computer 1 Issues with File Encryption
More informationCIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:
CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,
More informationIntroducing Genode. Norman Feske Genode Labs
Introducing Genode Norman Feske Genode Labs FOSDEM Feb 4, 2012 Overview 1. Why do we need another operating system? 2. Genode OS architecture at a glance 3. Features of the framework 4. Showcases 5. Plans
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationRESOURCE MANAGEMENT MICHAEL ROITZSCH
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group RESOURCE MANAGEMENT MICHAEL ROITZSCH AGENDA done: time, drivers today: misc. resources architectures for resource
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationFacing the Reality: Virtualization in a Microkernelbased Operating System. Matthias Lange, MOS, January 26th, 2016
Facing the Reality: Virtualization in a Microkernelbased Operating System Matthias Lange, MOS, January 26th, 2016 matthias.lange@kernkonzept.com Today's take aways Microkernel systems are used to build
More informationApplications of Attestation:
Lecture Secure, Trusted and Trustworthy Computing : IMA and TNC Prof. Dr. Ing. Ahmad Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2011/2012 1 Roadmap: TC
More informationTowards Application Security on Untrusted Operating Systems
Towards Application Security on Untrusted Operating Systems Dan R. K. Ports MIT CSAIL & VMware Tal Garfinkel VMware Motivation Many applications handle sensitive data financial, medical, insurance, military...
More informationImproving client systems security with Qubes OS
4 Jul 2016 We need secure client systems We need secure client systems Otherwise no security really works: We need secure client systems Otherwise no security really works: Encryption 2-factor authentication
More informationChapter 8 Network Security
Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationThe next step in IT security after Snowden
The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.internet-sicherheit.de
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationSE420 Software Quality Assurance
SE420 Software Quality Assurance Encryption Backgrounder September 5, 2014 Sam Siewert Encryption - Substitution Re-map Alphabet, 1-to-1 and On-to (function) A B C D E F G H I J K L M N O P Q R S T U V
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationRelease Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.
NCP Secure Enterprise Mac Client Service Release 2.05 Rev. 32317 Date: January 2017 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationOn the Internet, nobody knows you re a dog.
On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing
More informationOS Extensibility: SPIN and Exokernels. Robert Grimm New York University
OS Extensibility: SPIN and Exokernels Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? OS Abstraction Barrier
More informationCSE543 Computer and Network Security Module: Network Security
CSE543 Computer and Network Security Module: Network Security Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Communication Security Want to establish a secure channel
More informationData Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology
Centrally managed VPN Client Suite for macos/os X For Juniper SRX Series Central Management macos 10.13, 10.12, OS X 10.11, OS X 10.10 Dynamic Personal Firewall VPN Path Finder Technology (Fallback IPsec/HTTPS)
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationCHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File
More informationNCP Secure Entry macos Client Release Notes
Service Release: 3.20 r43098 Date: March 2019 Prerequisites Apple macos operating systems: The following Apple macos operating systems are supported with this release: macos Mojave 10.14 macos High Sierra
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationSecurity features for UBIFS. Richard Weinberger sigma star gmbh
Richard Weinberger sigma star gmbh /me Richard Weinberger Co-founder of sigma star gmbh Linux kernel developer and maintainer Strong focus on Linux kernel, lowlevel components, virtualization, security
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationRESOURCE MANAGEMENT MICHAEL ROITZSCH
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group RESOURCE MANAGEMENT MICHAEL ROITZSCH AGENDA done: time, drivers today: misc. resources architectures for resource
More informationNCP Secure Enterprise macos Client Release Notes
Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra
More informationGeneral-purpose computing with VirtualBox on Genode/NOVA. Norman Feske
General-purpose computing with VirtualBox on Genode/NOVA Norman Feske Outline 1. VirtualBox 2. NOVA microhypervisor and Genode 3. Transplantation of VirtualBox to NOVA 4.
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationA Technical Overview of the Lucent Managed Firewall
Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationLecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015
Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationThis version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.
NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac
More informationRelease Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.
NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this
More information(a) Which of these two conditions (high or low) is considered more serious? Justify your answer.
CS140 Winter 2006 Final Exam Solutions (1) In class we talked about the link count in the inode of the Unix file system being incorrect after a crash. The reference count can either be either too high
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationRESOURCE MANAGEMENT MICHAEL ROITZSCH
Department of Computer Science Institute for System Architecture, Operating Systems Group RESOURCE MANAGEMENT MICHAEL ROITZSCH AGENDA done: time, drivers today: misc. resources architectures for resource
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationCloud Native Security. OpenShift Commons Briefing
Cloud Native Security OpenShift Commons Briefing Amir Sharif Co-Founder amir@aporeto.com Cloud Native Applications Challenge Security Change Frequency x 10x 100x 1,000x Legacy (Pets) Servers VMs Cloud
More informationAdministrative Details. CS 140 Final Review Session. Pre-Midterm. Plan For Today. Disks + I/O. Pre-Midterm, cont.
Administrative Details CS 140 Final Review Session Final exam: 12:15-3:15pm, Thursday March 18, Skilling Aud (here) Questions about course material or the exam? Post to the newsgroup with Exam Question
More informationIP Security. Have a range of application specific security mechanisms
IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationSecure Sharing of an ICT Infrastructure Through Vinci
Secure Sharing of an ICT Infrastructure Through Vinci Fabrizio Baiardi 1 Daniele Sgandurra 2 1 Polo G. Marconi - La Spezia, University of Pisa, Italy 2 Department of Computer Science, University of Pisa,
More informationData Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology
Universal, centrally managed VPN Client Suite for macos/os X Central Management and Network Access Control Compatible with VPN Gateways (IPsec Standard) Integrated, dynamic Personal Firewall VPN Path Finder
More informationHikCentral V.1.1.x for Windows Hardening Guide
HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls
More informationTrusted Computing and O/S Security. Aggelos Kiayias Justin Neumann
Trusted Computing and O/S Security Aggelos Kiayias Justin Neumann O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each layer may try to verify the outer layer
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationHikCentral V1.3 for Windows Hardening Guide
HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote
More informationCIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec
CIS 6930/4930 Computer and Network Security Topic 8.1 IPsec 1 IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality
More informationSecure management using HP Network Node Manager SPI for SNMPv3
IT Operations Network Management Secure management using HP Network Node Manager SPI for SNMPv3 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Allocation Methods Free-Space Management
More informationKey Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge
Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of
More informationCSC 574 Computer and Network Security. TCP/IP Security
CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationProtocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.
P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and
More informationComputer Security Exam 3 Review. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 2017 Exam 3 Review Paul Krzyzanowski Rutgers University Spring 2017 April 18, 2018 CS 419 2017 Paul Krzyzanowski 1 Exam 3: Grade vs. Completion Time 5 Question 1 A high False Reject Rate
More informationLecture 12 Page 1. Lecture 12 Page 3
IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More information10 Defense Mechanisms
SE 4C03 Winter 2006 10 Defense Mechanisms Instructor: W. M. Farmer Revised: 23 March 2006 1 Defensive Services Authentication (subject, source) Access control (network, host, file) Data protection (privacy
More informationOPERATING SYSTEM. Chapter 12: File System Implementation
OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management
More informationESP Egocentric Social Platform
ESP Egocentric Social Platform T. J. Purtell, Ian Vo, Monica S. Lam With: Kanak Biscuitwala, Willem Bult, Dan Boneh, Ben Dodson, Steve Fan, and Frank Wang, Global Social Platforms Ideal for Meeting strangers
More informationMicrokernel Construction. Introduction. Michael Hohmuth. Lars Reuther. TU Dresden Operating Systems Group
Introduction Lecture Goals Provide deeper understanding of OS mechanisms Make all of you enthusiastic kernel hackers Illustrate alternative system design concepts Promote OS research at 2 Administration
More information