Applications of Attestation:

Size: px
Start display at page:

Download "Applications of Attestation:"

Transcription

1 Lecture Secure, Trusted and Trustworthy Computing : IMA and TNC Prof. Dr. Ing. Ahmad Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2011/2012 1

2 Roadmap: TC Functionalities IBM Integrity Measurement Architecture (IMA) Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 2, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

3 Overview of the Integrity Measurement Architecture (IMA) Design and implementation of a secure measurement system for Linux All executable data that is loaded onto the Linux system is measured before execution Uses conventional PC hardware with TPM Measurements are protected by the TPM Goal: Enable a remote system (challenger) to prove that a program on another system is integral to be used Integrity: binary code indicating whether a program and/or its environment has been modified in an unauthorized manner Slide Nr. 3, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

4 Problems IMA Aims to Solve Measurement of all executed content before it is executed on the system e.g., kernel, kernel modules, binaries, shared libraries, etc. Order of measurements Order of loading executable content is nearly random TCG integrity reports depend on the order of measurements and thus on the order of execution Performance overhead Operating system almost continuously loads executable content Measuring content at each load time results in considerable performance overhead Slide Nr. 4, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

5 Integrity Measurement Architecture Kernel, Runtime Environment, File Systems Measurement Agents Agents (MA) a) store Measurement List (ML) Trusted BIOS Hardware b) report digest report 2. QuoteRequest Attestation Service (AS) 3. QuoteResponse TPM PCR[0] PCR[N] 1. integrity challenge 5. integrity response Challenger/ Verifier (C) BIOS measures boot loader a) MAs store measurements in ordered list in kernel b) MAs report extension of measurement list to TPM 1. C requests ML and corresp. TPM signed aggregate 2. AS requests signed aggregate 3. TPM sends signed aggregate 4. AS gets ML from kernel 5. AS returns ML and corresp. TPM signed aggregate to C 6. C reasons about trustworthiness of attesting system s runtime integrity

6 Integrity Measurements Application e.g., script interpreter Measurement Agent Linux Kernel (LK) 11. m EC Measurement List... Storage Device e.g., hard disk Hardware m boot i 13. load EC Executable Content (EC) e.g., binaries, libraries, drivers, interpreters, scripts, etc. 12. TPM_Extend(SHA 1(EC)) contain hash chain of executable files loaded after they have been measured 10. load EC TPM PCR[15]... PCR[1] Measurement Agent bootup aggregate: PCR 0 to7 (BIOS,BL,LK) number of measurement 7. m boot 8. m EC 9. TPM_Extend(SHA 1(EC)) 5. TPM_Extend(SHA 1(LK)) 3. TPM_Extend(SHA 1(BL)) i, SHA 1( EC ), name EC load LK Boot Loader (BL) 4. load BL BIOS 2. load BIOS 1. TPM_Extend(SHA 1(BIOS)) CRTM EC name EC executable content name and/or version of EC

7 Security Goals Prevention of replay attacks e.g., an adversary should not be able to answer the challenger with an old measurement list Authenticity of the measurement list Tampering with measurement list or signature e.g., an adversary should not be able to manipulate the measurement list or to forge the TPM s signature Masquerading as another trusted platform e.g., an adversary should not be able to replace the original measurement list with the measurement list of another (noncompromised) system Slide Nr. 7, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

8 Integrity Challenge Protocol Attesting System Kernel, Run Time, File System ML ml Attestation Service based on ml and given reference measurements C is able to decide whether the attesting system can be considered trustworthy ChallengeRequest( N ) Challenger/Verifier System Challenger (C) create nonce N report store MA MA MA Hardware TPM_Quote2(N) TPM quote ChallengeResponse( quote, ml ) prevents masquerading provides integrity of ml (together with quote and PCR) prevents replay (together with quote) get trusted cert AIK (e.g., from Privacy CA) Verify cert AIK quote N ml (by re computing PCR using reference measurements) if verification is successful, ml is valid quote sign AIK ( PCR, N ) PCR current PCR values ml measurement list

9 Assumptions TCG specified services and protection used to Enable challenging parties to establish trust into the platform configuration of the attesting system Ensure challengers that the measurement list has not been tampered with Specifically: TPM is compliant with TCG specification: extend(), quote(),.. TPM is integrated correctly into the platform to ensure measurement of BIOS and boot loader Boot loader measures Linux Kernel correctly No hardware attacks (since TPM cannot prevent them) Slide Nr. 9, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

10 Roadmap: TC Functionalities IBM Integrity Measurement Architecture Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 10, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

11 TNC Overview TNC is a framework designed to add remote attestation to existing network authentication protocols Transforms secure channel into trusted channel i.e., a user is not only authenticated but also the user s computing platform identity and configuration are checked before access is granted proof of identity platform integrity report platform s integrity may be compromised by, e.g., viruses, Trojans, etc. TC concept ensures authentic reporting of platform integrity information may decide whether peer is trustworthy based on reported integrity information Slide Nr. 11, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

12 TCG Terminology Access Requestor (AR) Entity that requests access to a protected network e.g., a user or software process Platform Credential Authentication Proof of the identity of a platform e.g., via AIK certificates Integrity Check Handshake Verification of the integrity of a platform e.g., via remote attestation Slide Nr. 12, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

13 Goals of TNC Interoperable network access solution for different vendors and protocols IT T EAP: Integrate TNC as EAP method in handshake (EAP TNC) IF T TLS: Run TNC in parallel, on separate TLS channel Platform Authentication Platform Credential Authentication and Integrity Check Handshake of access requestor s platform Endpoint Policy Compliance Assignment of a level of trust to the access requestor s platform according to the presence, integrity and version of software on AR s platform. E.g., latest patches and anti virus. Otherwise, enforce isolation and provide remediation (recovery) Slide Nr. 13, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

14 Goals of TNC (cntd.) Access Policy Ensuring authentication of the access requestor and the disclosure of the access requestor s security posture before granting access to the network Assessment, Isolation and Remediation Isolation of systems that do not match the given Endpoint Policy Compliance or Access Policy Remediation of isolated platforms, e.g., by updating their software to match the given Endpoint Policy Compliance Slide Nr. 14, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

15 Basic TNC Architecture Access Requestor (AR) e.g., software on the platform that requests access to the protected network 1. request network access 4. request platform integrity report 6. platform integrity report Policy Enforcement Point (PEP) e.g., a router enforcing access restrictions to the protected network given by the PDP 2. AR s request 3. request platform integrity report 7. AR s platform integrity report Policy Decision Point (PDP) AAA server (e.g. RADIUS) that decides whether to grant AR access to the protected network according to given security policies 9. access restrictions 5. performs integrity measurements 10.enforces access restrictions given by PDP AAA stands for Authentication, Authorization and Accounting (well known AAA protocol implementations are RADIUS or DIAMETER) 8. verifies AR s platform integrity report and decides according to a given security policy and AR s platform configuration which levelof access should be granted to AR

16 TNC Architecture Details Access Requestor (AR) Policy Enforcement Point (PEP) Policy Decision Point (PDP) measures AR s Integrity platform integrity Measurement may use TPM to obtain authentic Collectors (IMC) platform integrity measurements Integrity Measurement Layer verifies AR s integrity based on measurements received from IMCs Integrity Measurement Verifiers (IMVs) TNC Client (TNCC) Integrity Evaluation Layer Network Access Requestor (NAR) Network Access Layer aggregates integrity measurements from IMCs assists management of Integrity Check Handshake negotiates and establishes network access to a given network implements network layer protocols controls access to the protected network enforces decisions of the PDP Policy Enforcement Point (PEP) manages message flow between IMCs and IMVs creates an Action Recommendation for the NAA based on the verification results from IMVs and a given policy decides whether NAR should be given access to the network TNC Server (TNCS) Network Access Authority (NAA)

17 TNC Example Scenario direct communication logical communication Notebook (AR) virusscanner personal firewall measurement IMC VS IMC PF IMCs All messages are relayed through the NAR, PEP and NAA a specific notebook is only allowed to connect to the network if its virus scanner and personal firewall software is up to date and has not been modified 7. integrity measurements 6. request for integrity measurements Authentication Server (PDP) security policies verification IMV VS IMV PF IMVs TNC Client (TNCC) 4. Platform Credential Authentication of AR to PDP 5. initiate Integrity Check Handshake 8. result of Integrity Check Handshake TNC Server (TNCS) WLAN Access Point (PEP) 3. initiate platform authentication 9. Action Recommendation NAR 802.1X Supplicant 1. request access PEP 802.1X Authenticator 2. decision request 10. access rules for AR NAA RADIUS Server

18 Illustration of TNC EAP Overhead: A Typical IKEv2 (IPsec) Flow Client Server IKE(Nonce,DH A,...) IKE(Nonce, DH B,...) Diffie Hellman key exchange & algorithm negotation IKE(ID,AUTH,CERT) Mutual authentication IKE(ID, AUTH, CERT) IKE([optional infos & Child SA negotiation]) Channel established in 2 roundtrips. IKE([optional infos & Child SA negotiation]) Optional Messages / Management Slide Nr. 18, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

19 EAP starts inside IKEv2 authentication Client IKE(Nonce,DH,...) Gateway EAP/TNC Server IKE(Nonce, DH,...) IKE(ID,[missing AUTH payload],..) IKE(ID, EAP(ID request)) IKE(EAP(ID response)) IKE(EAP(EAP FAST(start)))) IKE(EAP (EAP FAST(TLS_Client Hello)))) [full TLS handshake] RADIUS(AccessRequest) RADIUS(AccessChallenge)... Slide Nr. 19, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

20 EAP starts TLS for authentication, then TNC starts inside TLS... Client... Gateway EAP/TNC Server TNC Agents IKE(EAP(EAP FAST(TLS([client auth]))))... IKE(EAP(EAP FAST(TLS(IDrequest)))) IKE(EAP(EAP FAST(TLS(IDresponse)))) IKE(EAP(EAP FAST(TLS(EAP TNC(start))))) Messages in XML or TLV based reporting language with optional encryption. IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(Batch1))))))... IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(BatchN))))))... TNCCS(Batch1) TNCCS(Success) Batch1 Success Slide Nr. 20, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

21 EAP returns shared key, IKE resumes with PSK authentication (AUTH) Client Gateway... IKE(EAP(EAP FAST(TLS(EAP TNC(TNCCS(Success)))))) EAP/TNC Server IKE(EAP(Success)) IKE(AUTH) RADIUS(AccessRequest) RADIUS(AccessAccept) Mutual PSK authentication IKE([optional infos & Child SA negotiation])... At least 10 to 14 roundtrips to establish channel, plus RADIUS queries and protocol overhead(fragmentation!) Slide Nr. 21, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

22 Roadmap: TC Functionalities IBM Integrity Measurement Architecture Trusted Network Connect (TNC) Problems of Trusted Computing Slide Nr. 22, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

23 Expectations of Trusted Computing Initially very high expectations (and criticism) Full control over the software stack and files Proprietary programs will [ ] control which other programs you can run, which documents or data you can access Richard Stallmann, Can you trust your Computer? PCs become much harder to attack Really serious, well funded opponents will still be able to crack it Ross Anderson, TCPA FAQ What happened? Slide Nr. 23, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

24 Problems of Trusted Computing What to measure? IMA measures ~6000 files on for a default Linux desktop Not including configuration files, call parameters, scripts, To identify all attacks, should we measure all runtime I/O? TC will likely never be able to assure the absence of compromise Slide Nr. 24, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

25 Problems of Trusted Computing Integrity is not Security Measurement of program is mostly worthless if X has a security bug every day How to establish trust in Software X? 90% of the problem is software security, not TC Slide Nr. 25, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

26 Beyond TCG Improve software security ( trustworthiness ) TCB is all the software that an application depends on (typically several MB of libraries, services and drivers) Different OS designs improve isolation and reduce TCB Virtualization Microkernel Safe programming languages reduce security flaws (Java?) Design critical applications for simplicity, code re use and reduced information flow (e.g., services, not libraries) Trusted Execution Environments execute a transaction without relying on the complete OS, libraries etc. (e.g., Intel TXT, ARM TrustZone) Hard for established systems but possible for embedded Slide Nr. 26, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

27 Possible TC friendly OS Architecture Applications Existing OS Security applications App. Legacy OS (e.g., Linux) App. Isolation App. Legacy OS (e.g., Linux) App. untrusted storage Online VPN Grid Banking untrusted storage Trusted Software Layer Secure VMM Attestation Manager Compartment Manager Storage Manager Secure GUI TPM Manager Virtualization Layer Hypervisor (IPC, Memory Management, Scheduling) based on microkernel (e.g. Xen) Hardware CPU Devices Conventional Hardware TPM Trusted Computing (TC) Technology (TPM, Trusted Execution Technology (TXT), Presidio, etc.)

28 Components TC enabled hardware Ensuring authentication of the access requestor and the Trusted Service Layer Trust Manager: controls access to TPM interface Compartment Manager: Manages creation, updates, and deletion of compartments measures compartments and assigns unique IDs to them Storage manager guarantees trusted storage, i.e., authenticity, confidentiality and integrity (and freshness) of stored data Has access to configuration of clients it is communicating to over trusted channel Secure GUI: guarantee a trusted path to application Virtualization Layer provides abstraction of physical machine Provides isolation between virtual machines Slide Nr. 28, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

29 Questions for Future Engineers Why are half of the TPM PCRs reserved for bootup? Should IMA be allowed to delete/reset PCRs? What if App X does not measure the code it loads? What app uses TPM today? Why? Slide Nr. 29, Lecture Secure, Trusted and Trustworthy Computing, WS 2011/2012

4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE)

4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE) 4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE) IKEv2 IKE_SA_INIT, IKE_AUTH, and CREATE_CHILD_SA messages IKEv2 with client & server

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust

More information

Lecture Embedded System Security Trusted Platform Module

Lecture Embedded System Security Trusted Platform Module 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture

More information

Putting Trust Into The Network Securing Your Network Through Trusted Access Control

Putting Trust Into The Network Securing Your Network Through Trusted Access Control Putting Trust Into The Network Securing Your Network Through Trusted Access Control Steve Hanna, Juniper Networks Co-Chair, Trusted Network Connect Sub Group of Trusted Computing Group ACSAC December 2006

More information

Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008

Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008 Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008 Josef von Helden University of Applied Sciences and Arts, Hanover josef.vonhelden@fh-hannover.de Ingo Bente

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Introduction to Trusted Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Summer Term 2017 Roadmap: Trusted Computing Motivation

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2015/2016 Roadmap: TPM Introduction

More information

IFIP World Computer Congress (WCC2010)

IFIP World Computer Congress (WCC2010) IFIP World Computer Congress (WCC2010) Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks Prof. Dr.-Ing. Kai-Oliver Detken DECOIT GmbH, http://www.decoit.de,

More information

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have

More information

Trusted Network Access Control Experiences from Adoption

Trusted Network Access Control Experiences from Adoption Trusted Network Access Control Experiences from Adoption Joerg Vieweg joerg.vieweg@fh-hannover.de Trust@FHH Research Group University of Applied Sciences and Arts Hanover https://trust.inform.fh-hannover.de

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Trusted Virtual Domains: Towards Trustworthy Distributed Services. Ahmad-Reza Sadeghi System Security Lab Ruhr-Universität Bochum

Trusted Virtual Domains: Towards Trustworthy Distributed Services. Ahmad-Reza Sadeghi System Security Lab Ruhr-Universität Bochum Trusted Virtual Domains: Towards Trustworthy Distributed Services Ahmad-Reza Sadeghi System Security Lab Ruhr-Universität Bochum The Main Motivation Trustworthy Distributed Computing Selected Applications..

More information

Systems View -- Current. Trustworthy Computing. TC Advantages. Systems View -- Target. Bootstrapping a typical PC. Boot Guarantees

Systems View -- Current. Trustworthy Computing. TC Advantages. Systems View -- Target. Bootstrapping a typical PC. Boot Guarantees Trustworthy Computing s View -- Current Trent Jaeger February 18, 2004 Process 1 Web server Process 2 Mail server Process 3 Java VM Operating Hardware (CPU, MMU, I/O devices) s View -- Target TC Advantages

More information

Mutual Attestation of IoT Devices

Mutual Attestation of IoT Devices Mutual Attestation of IoT Devices Connect Security World September 2016 Marseille Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil

More information

OVAL + The Trusted Platform Module

OVAL + The Trusted Platform Module OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module

More information

Trusted Computing Special Aspects and Challenges

Trusted Computing Special Aspects and Challenges Trusted Computing Special Aspects and Challenges Prof. Dr. Ing. Ahmad Reza Sadeghi Chair for System Security Horst Görtz Institute for IT Security Ruhr University Bochum, Germany http://www.trust.rub.de

More information

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 02/06/14 Goals Understand principles of: Authenticated booting, diference to (closed) secure

More information

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009 Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2009 Goals Understand principles of: authenticated booting the

More information

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 30/05/11 Goals Understand principles of: Authenticated booting The difference to (closed) secure

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

Flicker: An Execution Infrastructure for TCB Minimization

Flicker: An Execution Infrastructure for TCB Minimization Flicker: An Execution Infrastructure for TCB Minimization Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Hiroshi Isozaki (EuroSys 08) Presented by: Tianyuan Liu Oct 31, 2017 Outline Motivation

More information

TNC EVERYWHERE. Pervasive Security

TNC EVERYWHERE. Pervasive Security TNC EVERYWHERE Pervasive Security TNC interfaces enable dynamic differentiation and access control enforcement for a wide variety of users in mixed-use environments. Policy Enforcement Employee (Stock

More information

Unicorn: Two- Factor Attestation for Data Security

Unicorn: Two- Factor Attestation for Data Security ACM CCS - Oct. 18, 2011 Unicorn: Two- Factor Attestation for Data Security M. Mannan Concordia University, Canada B. Kim, A. Ganjali & D. Lie University of Toronto, Canada 1 Unicorn target systems q High

More information

Mutual Attestation of IoT Devices and TPM 2.0 Support

Mutual Attestation of IoT Devices and TPM 2.0 Support Mutual Attestation of IoT Devices and TPM 2.0 Support TCG Members Meeting June 2016 Vienna Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

CSE543 - Computer and Network Security Module: Trusted Computing

CSE543 - Computer and Network Security Module: Trusted Computing CSE543 - Computer and Network Security Module: Trusted Computing Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 What is Trust? 2 What is Trust? dictionary.com Firm reliance

More information

Embedded System Security Mobile Hardware Platform Security

Embedded System Security Mobile Hardware Platform Security 1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by

More information

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD OVERVIEW Fundamental

More information

TPM v.s. Embedded Board. James Y

TPM v.s. Embedded Board. James Y TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions

More information

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer

More information

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007 Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2007 Goals Understand: authenticated booting the difference

More information

Embedded System Security Mobile Hardware Platform Security

Embedded System Security Mobile Hardware Platform Security 1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set

More information

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions Topic Prerequisites Security concepts Security-related concepts (e.g., entropy) Virtualization

More information

Platform Configuration Registers

Platform Configuration Registers Chapter 12 Platform Configuration Registers Platform Configuration Registers (PCRs) are one of the essential features of a TPM. Their prime use case is to provide a method to cryptographically record (measure)

More information

How to create a trust anchor with coreboot.

How to create a trust anchor with coreboot. How to create a trust anchor with coreboot. Trusted Computing vs Authenticated Code Modules Philipp Deppenwiese About myself Member of a hackerspace in germany. 10 years of experience in it-security. Did

More information

SECURITY ARCHITECTURES CARSTEN WEINHOLD

SECURITY ARCHITECTURES CARSTEN WEINHOLD Department of Computer Science Institute of System Architecture, Operating Systems Group SECURITY ARCHITECTURES CARSTEN WEINHOLD MOTIVATION Common observations: Complex software has security bugs Users

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate

Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate May 2007 Trusted Computing Group 3855 SW 153 rd Dr. Beaverton, OR 97006 TEL: (503) 619-0563 FAX: (503) 664-6708 admin@trustedcomputinggroup.org

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

Configuration of an IPSec VPN Server on RV130 and RV130W

Configuration of an IPSec VPN Server on RV130 and RV130W Configuration of an IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote access to corporate resources by establishing an encrypted tunnel

More information

GSE/Belux Enterprise Systems Security Meeting

GSE/Belux Enterprise Systems Security Meeting MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's

More information

TCG Trusted Network Communications TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification Version 2.0 Revision 5 8 May 2014 Published

TCG Trusted Network Communications TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification Version 2.0 Revision 5 8 May 2014 Published TCG Trusted Network Communications TNC IF-T: Protocol Bindings for Tunneled EAP Methods Revision 5 8 May Published Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2004- Copyright 2004- Trusted

More information

Enforcing Trust in Pervasive Computing. Trusted Computing Technology.

Enforcing Trust in Pervasive Computing. Trusted Computing Technology. Outline with Trusted Computing Technology. Shiqun Li 1,2 Shane Balfe 3 Jianying Zhou 2 Kefei Chen 1 1 Shanghai Jiao Tong University 2 Institute for InfoComm Research 3 Royal Holloway, University of London

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Trusted Computing. William A. Arbaugh Department of Computer Science University of Maryland cs.umd.edu

Trusted Computing. William A. Arbaugh Department of Computer Science University of Maryland cs.umd.edu Trusted Computing William A. Arbaugh Department of Computer Science University of Maryland waa @ cs.umd.edu http://www.cs.umd.edu/~waa Getting Started Would you like to know what software is running on

More information

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM

More information

Lecture Secure, Trusted and Trustworthy Computing Introduction to SGX

Lecture Secure, Trusted and Trustworthy Computing Introduction to SGX Lecture Secure, and Trustworthy Computing Introduction to Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Intel Software Guard Extensions

More information

IPSec Network Applications

IPSec Network Applications This chapter describes several methods for implementing IPSec within various network applications. Topics discussed in this chapter include: Implementing IPSec for PDN Access Applications, page 1 Implementing

More information

TERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004

TERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004 TERRA Authored by: Garfinkel,, Pfaff, Chow, Rosenblum,, and Boneh A virtual machine-based platform for trusted computing Presented by: David Rager November 10, 2004 Why there exists a need Commodity OS

More information

Network Security: IPsec. Tuomas Aura

Network Security: IPsec. Tuomas Aura Network Security: IPsec Tuomas Aura 3 IPsec architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects IP packets between two hosts or gateways Transparent to

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

Justifying Integrity Using a Virtual Machine Verifier

Justifying Integrity Using a Virtual Machine Verifier Justifying Integrity Using a Virtual Machine Verifier Abstract Emerging distributing computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in

More information

Application Level Network Access Control System Based on TNC Architecture for Enterprise Network

Application Level Network Access Control System Based on TNC Architecture for Enterprise Network Level Control System Based on Architecture for Enterprise Zhen Chen, Fa-Chao Deng, An-An Luo, Xin Jiang, Guo-Dong Li, Run-hua Zhang, Chuang Lin Research Institute of Information Technology Department of

More information

The Research of Trusted Security Architecture of MANET Node Based on OPNET Zhen Zhang

The Research of Trusted Security Architecture of MANET Node Based on OPNET Zhen Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Research of Security Architecture of MANET Node Based on OPNET Zhen Zhang Department of Electronic

More information

TUX : Trust Update on Linux Kernel

TUX : Trust Update on Linux Kernel TUX : Trust Update on Linux Kernel Suhho Lee Mobile OS Lab, Dankook university suhho1993@gmail.com -- Hyunik Kim, and Seehwan Yoo {eternity13, seehwan.yoo}@dankook.ac.kr Index Intro Background Threat Model

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Trusted Computing and O/S Security

Trusted Computing and O/S Security Computer Security Spring 2008 Trusted Computing and O/S Security Aggelos Kiayias University of Connecticut O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each

More information

Virtual Private Network

Virtual Private Network VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure

More information

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de

More information

Module 9. Configuring IPsec. Contents:

Module 9. Configuring IPsec. Contents: Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB)

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

RISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas

RISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas RISCV with Sanctum Enclaves Victor Costan, Ilia Lebedev, Srini Devadas Today, privilege implies trust (1/3) If computing remotely, what is the TCB? Priviledge CPU HW Hypervisor trusted computing base OS

More information

Trusted Computing and O/S Security. Aggelos Kiayias Justin Neumann

Trusted Computing and O/S Security. Aggelos Kiayias Justin Neumann Trusted Computing and O/S Security Aggelos Kiayias Justin Neumann O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each layer may try to verify the outer layer

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

IP Security II. Overview

IP Security II. Overview IP Security II Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State University

More information

Some optimizations can be done because of this selection of supported features. Those optimizations are specifically pointed out below.

Some optimizations can be done because of this selection of supported features. Those optimizations are specifically pointed out below. IKEv2 and Smart Objects (Tero Kivinen ) 1.0 Introduction This document tells what minimal IKEv2 implementation could look like. Minimal IKEv2 implementation only supports initiator end

More information

Introduction to IPsec. Charlie Kaufman

Introduction to IPsec. Charlie Kaufman Introduction to IPsec Charlie Kaufman charliek@microsoft.com 1 IP Security (IPsec) IETF standard for Network Layer security Popular for creating trusted link (VPN), either firewall-firewall, or machine

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Protecting Keys/Secrets in Network Automation Solutions. Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel

Protecting Keys/Secrets in Network Automation Solutions. Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel Protecting Keys/Secrets in Network Automation Solutions Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel Agenda Introduction Private Key Security Secret Management Tamper Detection Summary

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

The EN-4000 in Virtual Private Networks

The EN-4000 in Virtual Private Networks EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

CIS 4360 Secure Computer Systems SGX

CIS 4360 Secure Computer Systems SGX CIS 4360 Secure Computer Systems SGX Professor Qiang Zeng Spring 2017 Some slides are stolen from Intel docs Previous Class UEFI Secure Boot Windows s Trusted Boot Intel s Trusted Boot CIS 4360 Secure

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

OS Security IV: Virtualization and Trusted Computing

OS Security IV: Virtualization and Trusted Computing 1 OS Security IV: Virtualization and Trusted Computing Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 More questions? 3 Virtual machine monitor +-----------+----------------+-------------+

More information

CIS 4360 Secure Computer Systems. Trusted Platform Module

CIS 4360 Secure Computer Systems. Trusted Platform Module CIS 4360 Secure Computer Systems Trusted Platform Module Professor Qiang Zeng Spring 2017 Some slides were stolen from Stanford s Security Course, Bruce Maggs, and Bryan Parno Signed Integer Representation

More information

Windows Server Network Access Protection. Richard Chiu

Windows Server Network Access Protection. Richard Chiu Windows Server 2008 Network Access Protection Richard Chiu Network Access Protection Solution Overview Policy Validation Determines whether the computers are compliant with the company s security policy.

More information

Intel Software Guard Extensions

Intel Software Guard Extensions Intel Software Guard Extensions Dr. Matthias Hahn, Intel Deutschland GmbH July 12 th 2017 cryptovision Mindshare, Gelsenkirchen Intel SGX Making Headlines Premium Content requiring Intel SGX on PC Intel

More information

A Robust Integrity Reporting Protocol for Remote Attestation

A Robust Integrity Reporting Protocol for Remote Attestation A Robust Integrity Reporting Protocol for Remote Attestation Frederic Stumpf, Omid Tafreschi, Patrick Röder, Claudia Eckert Darmstadt University of Technology, Department of Computer Science, D-64289 Darmstadt,

More information

IP Security IK2218/EP2120

IP Security IK2218/EP2120 IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous

More information

Trusted Computing: Introduction & Applications

Trusted Computing: Introduction & Applications Trusted Computing: Introduction & Applications Lecture 8: TSS and TC Infrastructure Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany Literature 1. Thomas

More information

Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications

Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications CSE565: Computer Security Lectures 16 & 17 Authentication & Applications Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 Lec 16.1 Acknowledgments Material for some

More information

Intel s s Security Vision for Xen

Intel s s Security Vision for Xen Intel s s Security Vision for Xen Carlos Rozas Intel Corporation Xen Summit April 7-8, 7 2005 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Security in ECE Systems

Security in ECE Systems Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Crypto Background & Concepts SGX Software Attestation

Crypto Background & Concepts SGX Software Attestation CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 4b Slide deck extracted from Kamran s tutorial on SGX, presented during ECE 6095 Spring 2017 on Secure Computation and Storage, a precursor to this course

More information

INF3510 Information Security. Lecture 6: Computer Security. Universitetet i Oslo Audun Jøsang

INF3510 Information Security. Lecture 6: Computer Security. Universitetet i Oslo Audun Jøsang INF3510 Information Security Lecture 6: Computer Security Universitetet i Oslo Audun Jøsang Lecture Overview Secure computer architectures Virtualisation architectures Trusted computing Security Evaluation

More information