Applications of Attestation:
|
|
- Lesley Gibbs
- 6 years ago
- Views:
Transcription
1 Lecture Secure, Trusted and Trustworthy Computing : IMA and TNC Prof. Dr. Ing. Ahmad Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2011/2012 1
2 Roadmap: TC Functionalities IBM Integrity Measurement Architecture (IMA) Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 2, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
3 Overview of the Integrity Measurement Architecture (IMA) Design and implementation of a secure measurement system for Linux All executable data that is loaded onto the Linux system is measured before execution Uses conventional PC hardware with TPM Measurements are protected by the TPM Goal: Enable a remote system (challenger) to prove that a program on another system is integral to be used Integrity: binary code indicating whether a program and/or its environment has been modified in an unauthorized manner Slide Nr. 3, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
4 Problems IMA Aims to Solve Measurement of all executed content before it is executed on the system e.g., kernel, kernel modules, binaries, shared libraries, etc. Order of measurements Order of loading executable content is nearly random TCG integrity reports depend on the order of measurements and thus on the order of execution Performance overhead Operating system almost continuously loads executable content Measuring content at each load time results in considerable performance overhead Slide Nr. 4, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
5 Integrity Measurement Architecture Kernel, Runtime Environment, File Systems Measurement Agents Agents (MA) a) store Measurement List (ML) Trusted BIOS Hardware b) report digest report 2. QuoteRequest Attestation Service (AS) 3. QuoteResponse TPM PCR[0] PCR[N] 1. integrity challenge 5. integrity response Challenger/ Verifier (C) BIOS measures boot loader a) MAs store measurements in ordered list in kernel b) MAs report extension of measurement list to TPM 1. C requests ML and corresp. TPM signed aggregate 2. AS requests signed aggregate 3. TPM sends signed aggregate 4. AS gets ML from kernel 5. AS returns ML and corresp. TPM signed aggregate to C 6. C reasons about trustworthiness of attesting system s runtime integrity
6 Integrity Measurements Application e.g., script interpreter Measurement Agent Linux Kernel (LK) 11. m EC Measurement List... Storage Device e.g., hard disk Hardware m boot i 13. load EC Executable Content (EC) e.g., binaries, libraries, drivers, interpreters, scripts, etc. 12. TPM_Extend(SHA 1(EC)) contain hash chain of executable files loaded after they have been measured 10. load EC TPM PCR[15]... PCR[1] Measurement Agent bootup aggregate: PCR 0 to7 (BIOS,BL,LK) number of measurement 7. m boot 8. m EC 9. TPM_Extend(SHA 1(EC)) 5. TPM_Extend(SHA 1(LK)) 3. TPM_Extend(SHA 1(BL)) i, SHA 1( EC ), name EC load LK Boot Loader (BL) 4. load BL BIOS 2. load BIOS 1. TPM_Extend(SHA 1(BIOS)) CRTM EC name EC executable content name and/or version of EC
7 Security Goals Prevention of replay attacks e.g., an adversary should not be able to answer the challenger with an old measurement list Authenticity of the measurement list Tampering with measurement list or signature e.g., an adversary should not be able to manipulate the measurement list or to forge the TPM s signature Masquerading as another trusted platform e.g., an adversary should not be able to replace the original measurement list with the measurement list of another (noncompromised) system Slide Nr. 7, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
8 Integrity Challenge Protocol Attesting System Kernel, Run Time, File System ML ml Attestation Service based on ml and given reference measurements C is able to decide whether the attesting system can be considered trustworthy ChallengeRequest( N ) Challenger/Verifier System Challenger (C) create nonce N report store MA MA MA Hardware TPM_Quote2(N) TPM quote ChallengeResponse( quote, ml ) prevents masquerading provides integrity of ml (together with quote and PCR) prevents replay (together with quote) get trusted cert AIK (e.g., from Privacy CA) Verify cert AIK quote N ml (by re computing PCR using reference measurements) if verification is successful, ml is valid quote sign AIK ( PCR, N ) PCR current PCR values ml measurement list
9 Assumptions TCG specified services and protection used to Enable challenging parties to establish trust into the platform configuration of the attesting system Ensure challengers that the measurement list has not been tampered with Specifically: TPM is compliant with TCG specification: extend(), quote(),.. TPM is integrated correctly into the platform to ensure measurement of BIOS and boot loader Boot loader measures Linux Kernel correctly No hardware attacks (since TPM cannot prevent them) Slide Nr. 9, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
10 Roadmap: TC Functionalities IBM Integrity Measurement Architecture Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 10, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
11 TNC Overview TNC is a framework designed to add remote attestation to existing network authentication protocols Transforms secure channel into trusted channel i.e., a user is not only authenticated but also the user s computing platform identity and configuration are checked before access is granted proof of identity platform integrity report platform s integrity may be compromised by, e.g., viruses, Trojans, etc. TC concept ensures authentic reporting of platform integrity information may decide whether peer is trustworthy based on reported integrity information Slide Nr. 11, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
12 TCG Terminology Access Requestor (AR) Entity that requests access to a protected network e.g., a user or software process Platform Credential Authentication Proof of the identity of a platform e.g., via AIK certificates Integrity Check Handshake Verification of the integrity of a platform e.g., via remote attestation Slide Nr. 12, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
13 Goals of TNC Interoperable network access solution for different vendors and protocols IT T EAP: Integrate TNC as EAP method in handshake (EAP TNC) IF T TLS: Run TNC in parallel, on separate TLS channel Platform Authentication Platform Credential Authentication and Integrity Check Handshake of access requestor s platform Endpoint Policy Compliance Assignment of a level of trust to the access requestor s platform according to the presence, integrity and version of software on AR s platform. E.g., latest patches and anti virus. Otherwise, enforce isolation and provide remediation (recovery) Slide Nr. 13, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
14 Goals of TNC (cntd.) Access Policy Ensuring authentication of the access requestor and the disclosure of the access requestor s security posture before granting access to the network Assessment, Isolation and Remediation Isolation of systems that do not match the given Endpoint Policy Compliance or Access Policy Remediation of isolated platforms, e.g., by updating their software to match the given Endpoint Policy Compliance Slide Nr. 14, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
15 Basic TNC Architecture Access Requestor (AR) e.g., software on the platform that requests access to the protected network 1. request network access 4. request platform integrity report 6. platform integrity report Policy Enforcement Point (PEP) e.g., a router enforcing access restrictions to the protected network given by the PDP 2. AR s request 3. request platform integrity report 7. AR s platform integrity report Policy Decision Point (PDP) AAA server (e.g. RADIUS) that decides whether to grant AR access to the protected network according to given security policies 9. access restrictions 5. performs integrity measurements 10.enforces access restrictions given by PDP AAA stands for Authentication, Authorization and Accounting (well known AAA protocol implementations are RADIUS or DIAMETER) 8. verifies AR s platform integrity report and decides according to a given security policy and AR s platform configuration which levelof access should be granted to AR
16 TNC Architecture Details Access Requestor (AR) Policy Enforcement Point (PEP) Policy Decision Point (PDP) measures AR s Integrity platform integrity Measurement may use TPM to obtain authentic Collectors (IMC) platform integrity measurements Integrity Measurement Layer verifies AR s integrity based on measurements received from IMCs Integrity Measurement Verifiers (IMVs) TNC Client (TNCC) Integrity Evaluation Layer Network Access Requestor (NAR) Network Access Layer aggregates integrity measurements from IMCs assists management of Integrity Check Handshake negotiates and establishes network access to a given network implements network layer protocols controls access to the protected network enforces decisions of the PDP Policy Enforcement Point (PEP) manages message flow between IMCs and IMVs creates an Action Recommendation for the NAA based on the verification results from IMVs and a given policy decides whether NAR should be given access to the network TNC Server (TNCS) Network Access Authority (NAA)
17 TNC Example Scenario direct communication logical communication Notebook (AR) virusscanner personal firewall measurement IMC VS IMC PF IMCs All messages are relayed through the NAR, PEP and NAA a specific notebook is only allowed to connect to the network if its virus scanner and personal firewall software is up to date and has not been modified 7. integrity measurements 6. request for integrity measurements Authentication Server (PDP) security policies verification IMV VS IMV PF IMVs TNC Client (TNCC) 4. Platform Credential Authentication of AR to PDP 5. initiate Integrity Check Handshake 8. result of Integrity Check Handshake TNC Server (TNCS) WLAN Access Point (PEP) 3. initiate platform authentication 9. Action Recommendation NAR 802.1X Supplicant 1. request access PEP 802.1X Authenticator 2. decision request 10. access rules for AR NAA RADIUS Server
18 Illustration of TNC EAP Overhead: A Typical IKEv2 (IPsec) Flow Client Server IKE(Nonce,DH A,...) IKE(Nonce, DH B,...) Diffie Hellman key exchange & algorithm negotation IKE(ID,AUTH,CERT) Mutual authentication IKE(ID, AUTH, CERT) IKE([optional infos & Child SA negotiation]) Channel established in 2 roundtrips. IKE([optional infos & Child SA negotiation]) Optional Messages / Management Slide Nr. 18, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
19 EAP starts inside IKEv2 authentication Client IKE(Nonce,DH,...) Gateway EAP/TNC Server IKE(Nonce, DH,...) IKE(ID,[missing AUTH payload],..) IKE(ID, EAP(ID request)) IKE(EAP(ID response)) IKE(EAP(EAP FAST(start)))) IKE(EAP (EAP FAST(TLS_Client Hello)))) [full TLS handshake] RADIUS(AccessRequest) RADIUS(AccessChallenge)... Slide Nr. 19, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
20 EAP starts TLS for authentication, then TNC starts inside TLS... Client... Gateway EAP/TNC Server TNC Agents IKE(EAP(EAP FAST(TLS([client auth]))))... IKE(EAP(EAP FAST(TLS(IDrequest)))) IKE(EAP(EAP FAST(TLS(IDresponse)))) IKE(EAP(EAP FAST(TLS(EAP TNC(start))))) Messages in XML or TLV based reporting language with optional encryption. IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(Batch1))))))... IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(BatchN))))))... TNCCS(Batch1) TNCCS(Success) Batch1 Success Slide Nr. 20, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
21 EAP returns shared key, IKE resumes with PSK authentication (AUTH) Client Gateway... IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(Success)))))) EAP/TNC Server IKE(EAP(Success)) IKE(AUTH) RADIUS(AccessRequest) RADIUS(AccessAccept) Mutual PSK authentication IKE([optional infos & Child SA negotiation])... At least 10 to 14 roundtrips to establish channel, plus RADIUS queries and protocol overhead(fragmentation!) Slide Nr. 21, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
22 Roadmap: TC Functionalities IBM Integrity Measurement Architecture Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 22, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
23 Expectations of Trusted Computing Initially very high expectations (and criticism) Full control over the software stack and files Proprietary programs will [ ] control which other programs you can run, which documents or data you can access Richard Stallmann, Can you trust your Computer? PCs become much harder to attack Really serious, well funded opponents will still be able to crack it Ross Anderson, TCPA FAQ What happened? Slide Nr. 23, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
24 Problems of Trusted Computing What to measure? IMA measures ~6000 files on for a default Linux desktop Not including configuration files, call parameters, scripts, To identify all attacks, should we measure all runtime I/O? TC will likely never be able to assure the absence of compromise Slide Nr. 24, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
25 Problems of Trusted Computing Integrity is not Security Measurement of program is mostly worthless if X has a security bug every day How to establish trust in Software X? 90% of the problem is software security, not TC Slide Nr. 25, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
26 Beyond TCG Improve software security ( trustworthiness ) TCB is all the software that an application depends on (typically several MB of libraries, services and drivers) Different OS designs improve isolation and reduce TCB Virtualization Microkernel Safe programming languages reduce security flaws (Java?) Design critical applications for simplicity, code re use and reduced information flow (e.g., services, not libraries) Trusted Execution Environments execute a transaction without relying on the complete OS, libraries etc. (e.g., Intel TXT, ARM TrustZone) Hard for established systems but possible for embedded Slide Nr. 26, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
27 Possible TC friendly OS Architecture Applications Existing OS Security applications App. Legacy OS (e.g., Linux) App. Isolation App. Legacy OS (e.g., Linux) App. untrusted storage Online VPN Grid Banking untrusted storage Trusted Software Layer Secure VMM Attestation Manager Compartment Manager Storage Manager Secure GUI TPM Manager Virtualization Layer Hypervisor (IPC, Memory Management, Scheduling) based on microkernel (e.g. Xen) Hardware CPU Devices Conventional Hardware TPM Trusted Computing (TC) Technology (TPM, Trusted Execution Technology (TXT), Presidio, etc.)
28 Components TC enabled hardware Ensuring authentication of the access requestor and the Trusted Service Layer Trust Manager: controls access to TPM interface Compartment Manager: Manages creation, updates, and deletion of compartments measures compartments and assigns unique IDs to them Storage manager guarantees trusted storage, i.e., authenticity, confidentiality and integrity (and freshness) of stored data Has access to configuration of clients it is communicating to over trusted channel Secure GUI: guarantee a trusted path to application Virtualization Layer provides abstraction of physical machine Provides isolation between virtual machines Slide Nr. 28, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
29 Questions for Future Engineers Why are half of the TPM PCRs reserved for bootup? Should IMA be allowed to delete/reset PCRs? What if App X does not measure the code it loads? What app uses TPM today? Why? Slide Nr. 29, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012
4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE)
4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE) IKEv2 IKE_SA_INIT, IKE_AUTH, and CREATE_CHILD_SA messages IKEv2 with client & server
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust
More informationLecture Embedded System Security Trusted Platform Module
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture
More informationPutting Trust Into The Network Securing Your Network Through Trusted Access Control
Putting Trust Into The Network Securing Your Network Through Trusted Access Control Steve Hanna, Juniper Networks Co-Chair, Trusted Network Connect Sub Group of Trusted Computing Group ACSAC December 2006
More informationTrusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008
Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008 Josef von Helden University of Applied Sciences and Arts, Hanover josef.vonhelden@fh-hannover.de Ingo Bente
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Introduction to Trusted Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Summer Term 2017 Roadmap: Trusted Computing Motivation
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2015/2016 Roadmap: TPM Introduction
More informationIFIP World Computer Congress (WCC2010)
IFIP World Computer Congress (WCC2010) Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks Prof. Dr.-Ing. Kai-Oliver Detken DECOIT GmbH, http://www.decoit.de,
More informationTerra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)
Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have
More informationTrusted Network Access Control Experiences from Adoption
Trusted Network Access Control Experiences from Adoption Joerg Vieweg joerg.vieweg@fh-hannover.de Trust@FHH Research Group University of Applied Sciences and Arts Hanover https://trust.inform.fh-hannover.de
More informationProtocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.
P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and
More informationTrusted Virtual Domains: Towards Trustworthy Distributed Services. Ahmad-Reza Sadeghi System Security Lab Ruhr-Universität Bochum
Trusted Virtual Domains: Towards Trustworthy Distributed Services Ahmad-Reza Sadeghi System Security Lab Ruhr-Universität Bochum The Main Motivation Trustworthy Distributed Computing Selected Applications..
More informationSystems View -- Current. Trustworthy Computing. TC Advantages. Systems View -- Target. Bootstrapping a typical PC. Boot Guarantees
Trustworthy Computing s View -- Current Trent Jaeger February 18, 2004 Process 1 Web server Process 2 Mail server Process 3 Java VM Operating Hardware (CPU, MMU, I/O devices) s View -- Target TC Advantages
More informationMutual Attestation of IoT Devices
Mutual Attestation of IoT Devices Connect Security World September 2016 Marseille Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil
More informationOVAL + The Trusted Platform Module
OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module
More informationTrusted Computing Special Aspects and Challenges
Trusted Computing Special Aspects and Challenges Prof. Dr. Ing. Ahmad Reza Sadeghi Chair for System Security Horst Görtz Institute for IT Security Ruhr University Bochum, Germany http://www.trust.rub.de
More informationDistributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing
Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 02/06/14 Goals Understand principles of: Authenticated booting, diference to (closed) secure
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2009 Goals Understand principles of: authenticated booting the
More informationDistributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing
Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 30/05/11 Goals Understand principles of: Authenticated booting The difference to (closed) secure
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationAbout FIPS, NGE, and AnyConnect
About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect
More informationFlicker: An Execution Infrastructure for TCB Minimization
Flicker: An Execution Infrastructure for TCB Minimization Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Hiroshi Isozaki (EuroSys 08) Presented by: Tianyuan Liu Oct 31, 2017 Outline Motivation
More informationTNC EVERYWHERE. Pervasive Security
TNC EVERYWHERE Pervasive Security TNC interfaces enable dynamic differentiation and access control enforcement for a wide variety of users in mixed-use environments. Policy Enforcement Employee (Stock
More informationUnicorn: Two- Factor Attestation for Data Security
ACM CCS - Oct. 18, 2011 Unicorn: Two- Factor Attestation for Data Security M. Mannan Concordia University, Canada B. Kim, A. Ganjali & D. Lie University of Toronto, Canada 1 Unicorn target systems q High
More informationMutual Attestation of IoT Devices and TPM 2.0 Support
Mutual Attestation of IoT Devices and TPM 2.0 Support TCG Members Meeting June 2016 Vienna Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationCSE543 - Computer and Network Security Module: Trusted Computing
CSE543 - Computer and Network Security Module: Trusted Computing Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 What is Trust? 2 What is Trust? dictionary.com Firm reliance
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by
More informationINFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD OVERVIEW Fundamental
More informationTPM v.s. Embedded Board. James Y
TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions
More informationKey Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge
Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2007 Goals Understand: authenticated booting the difference
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set
More informationDemonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin
Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions Topic Prerequisites Security concepts Security-related concepts (e.g., entropy) Virtualization
More informationPlatform Configuration Registers
Chapter 12 Platform Configuration Registers Platform Configuration Registers (PCRs) are one of the essential features of a TPM. Their prime use case is to provide a method to cryptographically record (measure)
More informationHow to create a trust anchor with coreboot.
How to create a trust anchor with coreboot. Trusted Computing vs Authenticated Code Modules Philipp Deppenwiese About myself Member of a hackerspace in germany. 10 years of experience in it-security. Did
More informationSECURITY ARCHITECTURES CARSTEN WEINHOLD
Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD MOTIVATION Common observations: Complex software has security bugs Users
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationStandardizing Network Access Control: TNC and Microsoft NAP to Interoperate
Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate May 2007 Trusted Computing Group 3855 SW 153 rd Dr. Beaverton, OR 97006 TEL: (503) 619-0563 FAX: (503) 664-6708 admin@trustedcomputinggroup.org
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationConfiguration of an IPSec VPN Server on RV130 and RV130W
Configuration of an IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote access to corporate resources by establishing an encrypted tunnel
More informationGSE/Belux Enterprise Systems Security Meeting
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's
More informationTCG Trusted Network Communications TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification Version 2.0 Revision 5 8 May 2014 Published
TCG Trusted Network Communications TNC IF-T: Protocol Bindings for Tunneled EAP Methods Revision 5 8 May Published Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2004- Copyright 2004- Trusted
More informationEnforcing Trust in Pervasive Computing. Trusted Computing Technology.
Outline with Trusted Computing Technology. Shiqun Li 1,2 Shane Balfe 3 Jianying Zhou 2 Kefei Chen 1 1 Shanghai Jiao Tong University 2 Institute for InfoComm Research 3 Royal Holloway, University of London
More informationGrandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide
Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationTrusted Computing. William A. Arbaugh Department of Computer Science University of Maryland cs.umd.edu
Trusted Computing William A. Arbaugh Department of Computer Science University of Maryland waa @ cs.umd.edu http://www.cs.umd.edu/~waa Getting Started Would you like to know what software is running on
More informationSACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema
SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM
More informationLecture Secure, Trusted and Trustworthy Computing Introduction to SGX
Lecture Secure, and Trustworthy Computing Introduction to Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Intel Software Guard Extensions
More informationIPSec Network Applications
This chapter describes several methods for implementing IPSec within various network applications. Topics discussed in this chapter include: Implementing IPSec for PDN Access Applications, page 1 Implementing
More informationTERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004
TERRA Authored by: Garfinkel,, Pfaff, Chow, Rosenblum,, and Boneh A virtual machine-based platform for trusted computing Presented by: David Rager November 10, 2004 Why there exists a need Commodity OS
More informationNetwork Security: IPsec. Tuomas Aura
Network Security: IPsec Tuomas Aura 3 IPsec architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects IP packets between two hosts or gateways Transparent to
More informationVirtual Private Networks
EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,
More informationJustifying Integrity Using a Virtual Machine Verifier
Justifying Integrity Using a Virtual Machine Verifier Abstract Emerging distributing computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in
More informationApplication Level Network Access Control System Based on TNC Architecture for Enterprise Network
Level Control System Based on Architecture for Enterprise Zhen Chen, Fa-Chao Deng, An-An Luo, Xin Jiang, Guo-Dong Li, Run-hua Zhang, Chuang Lin Research Institute of Information Technology Department of
More informationThe Research of Trusted Security Architecture of MANET Node Based on OPNET Zhen Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Research of Security Architecture of MANET Node Based on OPNET Zhen Zhang Department of Electronic
More informationTUX : Trust Update on Linux Kernel
TUX : Trust Update on Linux Kernel Suhho Lee Mobile OS Lab, Dankook university suhho1993@gmail.com -- Hyunik Kim, and Seehwan Yoo {eternity13, seehwan.yoo}@dankook.ac.kr Index Intro Background Threat Model
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationTrusted Computing and O/S Security
Computer Security Spring 2008 Trusted Computing and O/S Security Aggelos Kiayias University of Connecticut O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each
More informationVirtual Private Network
VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure
More informationIDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters
IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de
More informationModule 9. Configuring IPsec. Contents:
Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB)
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationRISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas
RISCV with Sanctum Enclaves Victor Costan, Ilia Lebedev, Srini Devadas Today, privilege implies trust (1/3) If computing remotely, what is the TCB? Priviledge CPU HW Hypervisor trusted computing base OS
More informationTrusted Computing and O/S Security. Aggelos Kiayias Justin Neumann
Trusted Computing and O/S Security Aggelos Kiayias Justin Neumann O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each layer may try to verify the outer layer
More informationIntelligent Terminal System Based on Trusted Platform Module
American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal
More informationIP Security II. Overview
IP Security II Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State University
More informationSome optimizations can be done because of this selection of supported features. Those optimizations are specifically pointed out below.
IKEv2 and Smart Objects (Tero Kivinen ) 1.0 Introduction This document tells what minimal IKEv2 implementation could look like. Minimal IKEv2 implementation only supports initiator end
More informationIntroduction to IPsec. Charlie Kaufman
Introduction to IPsec Charlie Kaufman charliek@microsoft.com 1 IP Security (IPsec) IETF standard for Network Layer security Popular for creating trusted link (VPN), either firewall-firewall, or machine
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationProtecting Keys/Secrets in Network Automation Solutions. Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel
Protecting Keys/Secrets in Network Automation Solutions Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel Agenda Introduction Private Key Security Secret Management Tamper Detection Summary
More informationCertificate Enrollment for the Atlas Platform
Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps
More informationThe EN-4000 in Virtual Private Networks
EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationCIS 4360 Secure Computer Systems SGX
CIS 4360 Secure Computer Systems SGX Professor Qiang Zeng Spring 2017 Some slides are stolen from Intel docs Previous Class UEFI Secure Boot Windows s Trusted Boot Intel s Trusted Boot CIS 4360 Secure
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationOS Security IV: Virtualization and Trusted Computing
1 OS Security IV: Virtualization and Trusted Computing Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 More questions? 3 Virtual machine monitor +-----------+----------------+-------------+
More informationCIS 4360 Secure Computer Systems. Trusted Platform Module
CIS 4360 Secure Computer Systems Trusted Platform Module Professor Qiang Zeng Spring 2017 Some slides were stolen from Stanford s Security Course, Bruce Maggs, and Bryan Parno Signed Integer Representation
More informationWindows Server Network Access Protection. Richard Chiu
Windows Server 2008 Network Access Protection Richard Chiu Network Access Protection Solution Overview Policy Validation Determines whether the computers are compliant with the company s security policy.
More informationIntel Software Guard Extensions
Intel Software Guard Extensions Dr. Matthias Hahn, Intel Deutschland GmbH July 12 th 2017 cryptovision Mindshare, Gelsenkirchen Intel SGX Making Headlines Premium Content requiring Intel SGX on PC Intel
More informationA Robust Integrity Reporting Protocol for Remote Attestation
A Robust Integrity Reporting Protocol for Remote Attestation Frederic Stumpf, Omid Tafreschi, Patrick Röder, Claudia Eckert Darmstadt University of Technology, Department of Computer Science, D-64289 Darmstadt,
More informationIP Security IK2218/EP2120
IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous
More informationTrusted Computing: Introduction & Applications
Trusted Computing: Introduction & Applications Lecture 8: TSS and TC Infrastructure Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany Literature 1. Thomas
More informationAcknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications
CSE565: Computer Security Lectures 16 & 17 Authentication & Applications Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 Lec 16.1 Acknowledgments Material for some
More informationIntel s s Security Vision for Xen
Intel s s Security Vision for Xen Carlos Rozas Intel Corporation Xen Summit April 7-8, 7 2005 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationCrypto Background & Concepts SGX Software Attestation
CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 4b Slide deck extracted from Kamran s tutorial on SGX, presented during ECE 6095 Spring 2017 on Secure Computation and Storage, a precursor to this course
More informationINF3510 Information Security. Lecture 6: Computer Security. Universitetet i Oslo Audun Jøsang
INF3510 Information Security Lecture 6: Computer Security Universitetet i Oslo Audun Jøsang Lecture Overview Secure computer architectures Virtualisation architectures Trusted computing Security Evaluation
More information