Introduction to Trusted Execution Environments (TEE) IY5606
|
|
|
- Andrew Skinner
- 10 years ago
- Views:
Transcription
1 Introduction to Trusted Execution Environments (TEE) IY5606 Steven J. Murdoch Computer Laboratory
2 Learning objectives Trusted Execution Environment (TEE) Understand what a TEE is and why it is of interest Appreciate the range of standards and products that offer TEE capability Be able to describe the basic building blocks of a typical TEE Compare the attack resistance of a TEE product w.r.t. security evaluated smart cards Contrast ownership and management issues w.r.t. a traditional smart card/sim model 2
3 Trusted vs. Trustworthy Trusted Someone or something you rely upon to not compromise your security Trustworthy Someone or something will not compromise your security Trusted is about how you use something Trustworthy is about whether it is safe to use something Trusted Execution Environments are what you may choose to rely upon to execute sensitive tasks Hopefully they are Trustworthy too! 3
4 Goals of a Trusted Execution Environment TEE [Vasudevan et al.] Isolated Execution TEE may be malicious Secure Storage Traditional security Confidentiality Integrity Availability Integrity, Confidentiality, Freshness Remote Attestation Secure Provisioning Trusted Path 4
5 Example applications Cryptography Key storage (never leaves the TEE in the clear) Key usage policy enforcement Password verification Commonly used to unlock keys Digital Rights Management (DRM) Typically involves cryptography Also requires control over peripherals 5
6 Trusted Computing Base The Trusted Computing Base is the smallest amount of code (and hardware, people, processes, etc.) that you must trust in order to meet your security requirements Confidence in the TCB can be increased though Static verification Code inspection Testing Formal methods All of these methods are expensive, so reducing the complexity of the TCB is an important goal but is not sufficient 6
7 Trusted Computing Base The Trusted Computing static OSStatus Base is the smallest amount of code (and hardware, people, SSLVerifySignedServerKeyExchange(SSLContext processes, etc.) that you must trust in *ctx, order bool to isrsa, meet your security requirements Confidence in the! TCB... can be increased though Static verification Code inspection Testing Formal methods SSLBuffer signedparams, uint8_t *signature, UInt16 signaturelen) {! OSStatus err;! if ((err = SSLHashSHA1.update(&hashCtx, &serverrandom))!= 0)!! goto fail;! if ((err = SSLHashSHA1.update(&hashCtx, &signedparams))!= 0)!! goto fail;!! goto fail;! if ((err = SSLHashSHA1.final(&hashCtx, &hashout))!= 0)!! goto fail;!... fail:! SSLFreeBuffer(&signedHashes);! SSLFreeBuffer(&hashCtx); All of these methods are expensive, so reducing the complexity of the! return err; TCB is an important } goal but is not sufficient 6
8 Trusted Platform Module (TPM) It was hoped that the TPM could create a TEE through the Static Root of Trust Measurement (SRTM) Measure hash all software loaded since BIOS OS would perform isolation Attempted by Microsoft as Next-Generation Secure Computing Base (a.k.a. Palladium) Shelved in 2004, but some aspects remain e.g. in Bitlocker disk encryption and Early Launch Anti-Malware (ELAM) Problem was that TCB became too large and too dynamic Two identical computers could have different hashes 7
9 Trusted Platform Module (TPM) It was hoped that the TPM could create a TEE through the Static Root of Trust Measurement (SRTM) Measure hash all software loaded since BIOS OS would perform isolation Attempted by Microsoft as Next-Generation Secure Computing Base (a.k.a. Palladium) Shelved in 2004, but some aspects remain e.g. in Bitlocker disk encryption and Early Launch Anti-Malware (ELAM) Problem was that TCB became too large and too dynamic Two identical computers could have different hashes 7
10 Dynamic Root of Trust Measurement (DRTM) Rather than trust everything since BIOS, reset CPU and start measuring from that point on TPM v1.2 added dynamic registers (17 23) Set to -1 on boot Can be reset by OS to 0 Register 17 is special Only set by calling SKINIT (AMD-V) or SENTER (Intel TXT) Disables DMA, interrupts, debugging Measures and executes Secure Loader Block 8
11 Hypervisor TEE DRTM was intended to allow loading of a hypervisor e.g. Xen or VMWare ESX Hypervisor loads and isolates virtual machines TPM can attest to hash of hypervisor TPM sealed storage can be released only to hypervisor once it has been loaded properly Some optimism that this would help for cloud computing Hypervisor is still a huge amount of code to validate (Xen contains a full copy of Linux; VMWare is of similar size) 9
12 Flicker TEE [McCune et al.] Flicker takes advantage of DRTM but for much smaller amounts of code (Pieces of Application Logic PAL) 1. Suspend OS 2. Execute small amount of code on main CPU 3. If necessary unseal storage and make changes 4. Increment counter on TPM, storing this and data in sealed storage 5. Restore OS Flicker runs at highest level of privilege so PAL is protected from OS but not other way around 10
13 Intel Identity Protection Technology [Carbin] Runs Java applet on separate CPU Management Engine part of chipset so bound to physical hardware ARC4 CPU Applications currently available include Key generation and storage (integrated with Windows Cryptographic API) One time password generation (VASCO MYDIGIPASS.COM) Secure PIN entry Possible because chipset also manages video 11
14 Intel IPT video 12
15 ARM TrustZone CPU buses extended to a 33rd bit, signaling whether in secure mode Signal exposed outside of the CPU to allow secure peripherals and secure RAM Potentially could have indicator for which mode CPU is in Open system and documented, but only allows one secure enclave 13
16 Trustonic TrustZone is not very useful by itself due to only allowing one enclave Gemalto developed the Trusted Foundations system G+D developed MobiCore Both split the one secure enclave into several, essentially through a smart card operating system Trustonic now developing based on MobiCore License fees required to implement code Samsung Knox is similar, but also introduces secure boot 14
17 Trustonic family tree 15
18 Samsung Knox [Samsung]... App App App Android Framework Linux Kernel Secures Protects Security Enhancements for Android TrustZone-based Integrity Measurement Architecture (TIMA) Secure Boot Enhances Trusted Boot Hardware TrustZone 16
19 Intel SGX Tightly integrated with CPU Modifies memory management Enclaves protected from other code, and vice versa As enclaves are built, the code is measured in a similar way to the TPM Can be combined with IPT for trusted display Demonstration uses HDMI DRM for trusted path No publicly available hardware yet 17
20 Comparisons Economic Lock-in Who pays the license fees? Performance What can you do in the TEE? Functionality and flexibility How well connected is the TEE to the CPU and what can it do? Security What attacks are feasible 18
21 Detour: Security Economics About 8 years ago, researchers started looking at the Economics behind security decisions Failures in security were not primarily a result of not enough cryptography, but due to failure of incentives Why should you protect your computer against malware when it will be a victim of a DDoS who pays the cost c.f. why should you clean your sewage when it is the people downstream who bear the cost of pollution Supporting an economic model is now the primary goal of many security mechanisms e.g. printer cartridge authentication 19
22 IT Economics is different Network effects Value of a network grows super-linearly to its size (Metcalfe s Law says n 2, Briscoe/Odlyzko/Tilly suggest n log n); this drives monopolies, and is why we have just one Internet High fixed and low marginal costs Competition drives price down to marginal costs of production; but in IT industries this is usually (near as makes no difference) zero; hence copyright, patents etc. needed to recover capital investment Switching costs determine value Switching from an IT product or service is usually expensive; Shapiro- Varian theorem: net present value of a software company is the total switching costs to the nearest competitor 20
23 Economic impact on TEE design Time to market is critical High fixed/low marginal costs, network effects, and switching costs give first mover a big advantage Security often doesn t help here and often hinders Appealing to complementers also important People buy your product because of other products you enable Locking someone into your platform is valuable Your customers know this too Regulation is often needed but normally too slow 21
24 Economic considerations Wide variety of business models in play, and these have as much to do with the design choices as security Open specification (TPM) vs closed specification (SGX) Platform specific (IPT) vs generic platform (TPM) License fees paid to Chipset vendor (IPT) Handset manufacturer (Samsung Knox) OS vendor (Google NFC) CPU core developer (Trustonic) 22
25 Performance TPM TPM is really slow, and only has slow communications bus to CPU Flicker TEE code runs on main CPU so can be as fast and has access to as much RAM as OS will spare Trustzone (Trustonic, Samsung Knox) TEE code runs on main CPU so is as fast, but RAM may be limited Intel IPT TEE code runs on separate CPU, which is moderately fast Intel SGX TEE code runs on main CPU so is as fast, as much RAM as needed 23
26 Functionality TPM is isolated from CPU, so can only operate on what it is provided with (hence why Flicker and similar systems are needed) Trustzone only allows one compartment (hence why Trustonic and Knox are needed) IPT could be thought as similar to TPM (though used very differently) Also has access to display (likely as a result of its ME heritage) SGX very tightly integrated into CPU Has control over virtual memory management Very fast context switching and high-speed communications 24
27 Flexibility TPM functionality baked into hardware Designed to be flexible but what is there cannot be changed Flicker allows arbitrary code to be run, but it does not have access to OS or drivers As a result only computation and very simple I/O possible Intel IPT, Trustonic, Knox can run arbitrary code But it has to be licensed by Intel, Trustonic, Samsung first SGX allows anyone to run arbitrary code But how will attestation key business model be managed? 25
28 Security: side channel attacks If malicious code can share the same CPU as the TEE there is a risk of side-channel communication If goal is to separate two pieces of malicious code then covert channel communication is also a risk (but normally now) Examples include hyperthreading vulnerability in Intel CPUs Trustzone (Trustonic, Knox), SGX shares same CPU between TEE and untrustworthy code Intel IPT shares CPU with Intel-managed but possibly compromisable code TPM runs only security-oriented code which is (hopefully) well written and tested 26
29 Security: physical attacks Physical attacks on TEE generally considered outside of threat model Very hard to defend against, not a scalable attack Leak of attestation keys could be a problem DRM application cares whether code runs on a CPU or emulator Revocation can help with this TPM comes from smart card world so likely has some physical protection of keys (but this has been found flawed in some cases) Interface to CPU not protected at all Trustzone keys are in unencrypted flash SGX/IPT keys are on CPU which should be non-trivial to extract 27
30 Security: platform binding TPM chip is not well bound to CPU (could be removed or replaced) Intel IPT is more tightly integrated with CPU so much more challenging to remove or monitor communications Trustzone and SGX is the CPU so should be infeasible to modify without some serious hardware investment Good platform binding allows new types of applications (c.f. smart cards) Important to distinguish between scalable attacks Break once, run anywhere Broken until revoked One device at a time 28
31 Comparison with smart cards Performance TPM similar SGX, TrustZone, IPT much faster Flexibility TPM less flexible Trustzone, SGX better (IPT, Trustonic, KNOX similar) Security TPM similar (IPT too?) Trustzone, SGX, Trustonic, KNOX likely less secure 29
32 TEE goals Isolated Execution Secure Storage Remote Attestation Secure Provisioning Trusted Path TPM Not really (too limited) Yes (but very limited) Yes Yes No (easily bypassed) Flicker Yes (but no drivers) Yes (though TPM) Yes (through TPM) Yes (through TPM) Limited Trustonic/ KNOX IPT Yes (but restricted) Yes (but restricted) Yes Yes Yes Somewhat Yes Yes Yes Somewhat SGX Yes Yes Yes Yes Probably 30
33 Conclusions TEEs may offer Isolated Execution, Secure Storage, Remote Attestation, Secure Provisioning, Trusted Path Wide variety of products available which fulfill these goals to varying extent Design choices affect both what TEE applications can be supported and how secure they are Smart cards may offer better security, but lack of platform binding makes some applications infeasible to support Economics will have as much to do with design choices adopted then security Ownership of the platform is a key difference between different solutions 31
34 References A. Vasudevan, E. Owusu, Z. Zhou, J. Newsome, and J.M. McCune. Trustworthy Execution on Mobile Devices: What security properties can my mobile platform give me? In Trust and Trustworthy Computing, vol of LNCS, pp Springer, Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In Proceedings of the ACM European Conference on Computer Systems (EuroSys'08), Glasgow, Scotland, 31 March 4 April Paul Carbin. Intel Identity Protection Technology with PKI (Intel IPT with PKI). Technology Overview. 22 May 2012 Samsung. White Paper: An Overview of Samsung KNOX. Enterprise Mobility Solutions. September B. Briscoe, A. Odlyzko, B. Tilly. Metcalfe's Law is Wrong, IEEE Spectrum, July 2006, pp Carl Shapiro, Hal R Varian. Information Rules: A Strategic Guide to the Network Economy. December
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches Roland van Rijswijk-Deij 1,2 and Erik Poll 1 1 Radboud University Nijmegen, The Netherlands {rijswijk,erikpoll}@cs.ru.nl
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Security Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
Hardware Security for Device Authentication in the Smart Grid
Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin Department of Computer Science, University of Oxford, UK {andrew.paverd,andrew.martin}@cs.ox.ac.uk Abstract.
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Digital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology [email protected] Abstract Due to current legislation the digital signatures can be as valid as the hand written
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure
Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
EECatalog SPECIAL FEATURE
Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Mobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan Kari Kostiainen 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest in smartphone security 2 NA,
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
Performance tuning Xen
Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Trusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
Virtualizare sub Linux: avantaje si pericole. Dragos Manac
Virtualizare sub Linux: avantaje si pericole Dragos Manac 1 Red Hat Enterprise Linux 5 Virtualization Major Hypervisors Xen: University of Cambridge Computer Laboratory Fully open sourced Set of patches
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Leveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
Trusted Virtual Datacenter Radically simplified security management
IBM T. J. Watson Research Center Trusted Virtual Datacenter Radically simplified security management Stefan Berger, Ramón Cáceres, Dimitrios Pendarakis, Reiner Sailer, Ray Valdez Secure Systems Department,
Attacking Intel Trusted Execution Technology
Attacking Intel Trusted Execution Technology Rafal Wojtczuk [email protected] Joanna Rutkowska [email protected] ---===[ Invisible Things Lab ]===--- Abstract In this paper we present
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Mark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
