The MILS Component Integration Approach To Secure Information Sharing
|
|
|
- Kelly French
- 9 years ago
- Views:
Transcription
1 The MILS Component Integration Approach To Secure Information Sharing Carolyn Boettcher, Raytheon, El Segundo CA Rance DeLong, LynuxWorks, San Jose CA John Rushby, SRI International, Menlo Park CA Wilmar Sifre, AFRL/RITB, Rome NY Boettcher, DeLong, Rushby, Sifre Component Security Integration: 1
2 MILS Is a security architecture adopted for F22, F35, FCS, JTRS, DDG-1000, CDS among others We are talking about security as a critical property So need to provide strong assurance that it is achieved We build systems from components And we d like critical properties and assurance to compose component-wise as well That s the topic of this talk I also want to persuade you the approach might work for safety (i.e., IMA) as well as security And for enterprise (e.g., ground) and commercial systems, as well as embedded Boettcher, DeLong, Rushby, Sifre Component Security Integration: 2
3 The MILS Idea Traditionally presented as three layers Separation kernel, middleware, applications Physical Display, Keyboard & Mouse S TS S, TS Trusted Path (SL) (SL) (MLS) Console Manager (MLS) (MLS) File Sys. Driver (MLS) Web Browser IPv6 (MLS) PCS (MLS) RT CORBA/ DDS/WEB Full OS / Run-Time Libraries RT CORBA/ DDS/WEB Full OS / Run-Time Libraries Minimal Middleware Minimum Run-Time Library Separation Kernel Automatic Reload/Restart from Secure File System Processor Somewhat similar to IMA Boettcher, DeLong, Rushby, Sifre Component Security Integration: 3
4 The MILS Idea (ctd) Problem is, that doesn t compose i.e., it s not clear how you get a certified MILS system out of certified MILS components and subsystems Without opening everything up IMA has a similar problem I ll present a MILS Component Security Integration approach based on two levels That is compositional Boettcher, DeLong, Rushby, Sifre Component Security Integration: 4
5 Component Security Integration We build systems from components And we d like security properties and assurance/certification to compose That is, assurance for the whole is built on assurance for the components Seldom happens: assurance dives into everything The system security assurance argument may not decompose on architectural lines (Ibrahim Habli & Tim Kelly) So what is architecture? A good one simplifies the assurance case Boettcher, DeLong, Rushby, Sifre Component Security Integration: 5
6 The MILS Idea (Two-Level Version) Construct an architecture so that security assurance does decompose along structural lines Two issues in security: Enforce the security policy Manage shared resources securely The MILS idea is to handle these separately Focus the system architecture on simplifying the argument that policy is enforced correctly Hence policy architecture The policy architecture becomes the interface between the two issues Boettcher, DeLong, Rushby, Sifre Component Security Integration: 6
7 Policy Architecture Intuitively, a boxes and arrows diagram There is a formal model for this Boxes encapsulate data, information, control Access only local state, incoming communications i.e., they are state machines Arrows are channels for information flow Strictly unidirectional Absence of arrows is often crucial Some boxes are trusted to enforce local security policies Want the trusted boxes to be as simple as possible Decompose the policy architecture to achieve this Assume boxes and arrows are free Boettcher, DeLong, Rushby, Sifre Component Security Integration: 7
8 Crypto Controller Example: Step 1 Policy: no plaintext on black network header data red side header bypass encryption black side header encrypted data network stacks utilities compiler runtime operating system No architecture, everything trusted Boettcher, DeLong, Rushby, Sifre Component Security Integration: 8
9 Crypto Controller Example: Step 2 Good policy architecture: fewer things trusted bypass minimal runtime red operating system black operating system crypto hardware Local policies (notice these are intransitive): Header bypass: low bandwidth, data looks like headers Crypto: all output encrypted Boettcher, DeLong, Rushby, Sifre Component Security Integration: 9
10 Policy Architecture: Compositional Assurance Construct assurance for each trusted component individually i.e., each component enforces its local policy Then provide an argument that the local policies In the context of the policy architecture Combine to achieve the overall system policy Medium robustness: this is done informally High robustness: this is done formally Compositional verification Boettcher, DeLong, Rushby, Sifre Component Security Integration: 10
11 Compositional Verification for Policy Integration Need to specify what it means for a component to satisfy a policy under assumptions about its environment Then show how these compose (policy of one component becomes the assumptions of anther) Fairly standard Computer Science MILS is agnostic on the exact approach used Policies/assumptions as properties Or as abstract components Boettcher, DeLong, Rushby, Sifre Component Security Integration: 11
12 Resource Sharing Next, we need to implement the logical components and the communications of the policy architecture in an affordable manner Allow different components and communications to share resources Need to be sure the sharing does not violate the policy architecture Flaws might add new communications paths Might blur the separation between components Boettcher, DeLong, Rushby, Sifre Component Security Integration: 12
13 Poorly Controlled Resource Sharing red bypass crypto black Naive sharing could allow direct red to black information flow, or could blur the integrity of the components Boettcher, DeLong, Rushby, Sifre Component Security Integration: 13
14 Unintended Communications Paths bypass minimal runtime red operating system black operating system crypto hardware Boettcher, DeLong, Rushby, Sifre Component Security Integration: 14
15 Blurred Separation Between Components bypass minimal runtime red operating system black operating system crypto hardware Boettcher, DeLong, Rushby, Sifre Component Security Integration: 15
16 Secure Resource Sharing For broadly useful classes of resources e.g., file systems, networks, consoles, processors Provide implementations that can be shared securely Start by defining what it means to partition specific kinds of resource into separate logical components Definition in the form of a protection profile (PP) e.g., separation kernel protection profile (SKPP) or network subsystem PP, filesystem PP, etc. Then build and evaluate to the appropriate PP Boettcher, DeLong, Rushby, Sifre Component Security Integration: 16
17 Crypto Controller Example: Step 3 Separation kernel securely partitions the processor resource red bypass black device driver for crypto runtime or operating system minimal runtime runtime or operating system separation kernel crypto h/w The integrity of the policy architecture is preserved Boettcher, DeLong, Rushby, Sifre Component Security Integration: 17
18 A Generic MILS System separation kernel partitioning filesystem TSE Care and skill needed to determine which logical components share physical resources (performance, faults) Boettcher, DeLong, Rushby, Sifre Component Security Integration: 18
19 Resource Sharing: Compositional Assurance Construct assurance for each resource sharing component individually i.e., each component enforces separation Then provide an argument that the individual components Are additively compositional e.g., partitioning(kernel) + partitioning(network) provides partitioning(kernel + network) And therefore combine to create the policy architecture Medium robustness: this is done informally High robustness: this is done formally Compositional verification There is an asymmetry: partitioning network stacks and file systems and so on run as clients of the partitioning kernel Hence, a link to the three-layer view Boettcher, DeLong, Rushby, Sifre Component Security Integration: 19
20 Compositional Verification: Resource Sharing Integration We have a formal policy architecture model Fairly standard Computer Science Components are state machines Communications channels are shared variables Asynchronous composition Definition of well-formed policy architecture And of implementation respecting and enforcing a policy architecture Argument that these are additively compositional Boettcher, DeLong, Rushby, Sifre Component Security Integration: 20
21 MILS Business Model DoD moves things forward by supporting development of protection profiles Separation kernels, partitioning communications systems, TCP/IP network stacks, file systems, consoles, publish-subscribe Then vendors create a COTS marketplace of compliant components Currently they are all resource sharing components Should be some policy components, too E.g., filters, downgraders for CDS Could be a standardized CDS engine, many rule sets Rule sets derived from goals, not hand coded e.g., Ontologically-driven purpose and anti-purpose Or even MLS Boettcher, DeLong, Rushby, Sifre Component Security Integration: 21
22 Roadmap Example: MILS Architecture for Joint Training Exercises Boettcher, DeLong, Rushby, Sifre Component Security Integration: 22
23 Protection Profile Development rationale Explicit SFRs the nature threats add Security Functional Requirements Evaluation of the thing constraints from other PPs policies assumptions security objectives add select select SFR Common Criteria Security Assurance Requirements SAR scope depth Assurance Level EAL rigor Explicit SARs A lot of delicate work Boettcher, DeLong, Rushby, Sifre Component Security Integration: 23
24 Protection Profiles Development (ctd.) Developing individual PPs is difficult and delicate work Like developing a program against a big library With no way to test it, except inspection Compositionality means PPs have to be collectively coherent We are developing a Common Criteria Authoring Environment (CCAE) to assist construction of coherent PPs Ontological characterization of SFRs and SARs and rules for their combination Boettcher, DeLong, Rushby, Sifre Component Security Integration: 24
25 MILS and IMA Certification for MILS is more demanding than for IMA DO-178B Level A is comparable to EAL 4/5 High Robustness is EAL 6+/7+ So a separation kernel is more aggressively minimized than a partitioning IMA RTOS But the basic ideas are very similar And the MILS approach to compositional assurance might apply to IMA integration Boettcher, DeLong, Rushby, Sifre Component Security Integration: 25
26 MILS In The Enterprise (e.g., Ground Systems) Separation kernels are like minimal hypervisors (cf. Xen) MILS separation kernel (4 KSLOC), EAL7 Avionics partitioning kernel (20 KSLOC), DO-178B Level A ( EAL4) Hypervisor ( KSLOC), EAL? Can expect some convergence of APIs (cf. ARINC 653) Different vendors will offer different functionality/assurance tradeoffs Could extend hypervisors from providing isolated virtual hosts to supporting the policy architecture of a secure service Boettcher, DeLong, Rushby, Sifre Component Security Integration: 26
27 Summary The MILS approach seems a reasonable approach to compositional reasoning about secure resource sharing and functional policies Must also consider resource utilization Need tools to allocate/schedule resources such as processor time, bus access, IPC, devices Given adequate specifications These are fairly simple constraint satisfaction problems (e.g., CoBaSA) And fault propagation I think the approach can extend from security to safety And from embedded (airborne) to enterprise (ground) systems Boettcher, DeLong, Rushby, Sifre Component Security Integration: 27
Compositional Security Evaluation: The MILS approach
Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,
Raytheon Secure Systems and Networks
Technology Today HIGHLIGHTING RAYTHEON S TECHNOLOGY 2007 Issue 2 Raytheon Secure Systems and Networks Delivering Mission Assurance in a Hostile Cyberspace Feature The Benefits of Multi-Level Security Col.
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011
A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert
ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY
ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY Dr. Gregg Wildes DornerWorks www.dornerworks.com Embedded Systems Engineering for Security and Safety-Critical Systems Where Hardware
System Component Deployment in a Realtime Embedded Software Defined Radio (SDR) Architecture
System Component Deployment in a Realtime Embedded Software Defined Radio (SDR) Architecture Dawn Szelc The MITRE Corp. Lead System Engineer Mark Adams Exigent International VP Wireless Engineering Outline
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.
Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.
Formal Foundations for Security Architecture
Formal Foundations for Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 5, 2010 Overview Some recent Australian events MILS Security Towards a formal theory
The Service Availability Forum Specification for High Availability Middleware
The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum [email protected], [email protected],
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Service Oriented Architecture
Service Oriented Architecture Version 9 2 SOA-2 Overview Ok, now we understand the Web Service technology, but how about Service Oriented Architectures? A guiding analogy Terminology excursion Service,
SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS. By Alex Wilson, Director of Business Development, Aerospace and Defense
SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS By Alex Wilson, Director of Business Development, Aerospace and Defense EXECUTIVE SUMMARY Cost efficiency and affordability will always be key
Connecting your Coffee-Shop Laptop to a Life-critical System
Connecting your Coffee-Shop Laptop to a Life-critical System Jean Arlat, Yves Deswarte, Youssef Laarouchi, Éric de Nadai, David Powell 57th IFIP 10.4 working group meeting, Ishigaki, Japan, 21-25 January
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Certification Authorities Software Team (CAST) Position Paper CAST-13
Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Flight Processor Virtualization
National Aeronautics and Space Administration Flight Processor Virtualization Alan Cudmore / Code 582 9/11/2013 www.nasa.gov 1 Agenda Introduction to Virtualization Benefits of Virtualization for Satellite
SCADE System 17.0. Technical Data Sheet. System Requirements Analysis. Technical Data Sheet SCADE System 17.0 1
SCADE System 17.0 SCADE System is the product line of the ANSYS Embedded software family of products and solutions that empowers users with a systems design environment for use on systems with high dependability
Open Source Software
Open Source Software Title Experiences and considerations about open source software for standard software components in automotive environments 2 Overview Experiences Project Findings Considerations X-by-wire
EECatalog SPECIAL FEATURE
Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that
High Assurance Security/Safety for Deeply Embedded, Real-time Systems
High Assurance Security/Safety for Deeply Embedded, Real-time Systems R. William Beckwith Objective Interface Systems, Inc. Herndon, Virginia, U.S.A. [email protected] W. Mark Vanfleet National Security
The Integration Between EAI and SOA - Part I
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
MultiPARTES. Virtualization on Heterogeneous Multicore Platforms. 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM
MultiPARTES Virtualization on Heterogeneous Multicore Platforms 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM Contents Analysis of scheduling approaches Virtualization of devices Dealing with heterogeneous
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile
Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7
Technical Data Sheet SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers
661 Solutions for ARINC 661 Compliant Systems SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers SCADE Solutions for ARINC 661 Compliant
Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics
Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics Juan Zamorano, Juan A. de la Puente Universidad Politécnica de Madrid (UPM) E-28040 Madrid, Spain [email protected],
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
System Software Integration: An Expansive View. Overview
Software Integration: An Expansive View Steven P. Smith Design of Embedded s EE382V Fall, 2009 EE382 SoC Design Software Integration SPS-1 University of Texas at Austin Overview Some Definitions Introduction:
Real-time Operating Systems. VO Embedded Systems Engineering Armin Wasicek 11.12.2012
Real-time Operating Systems VO Embedded Systems Engineering Armin Wasicek 11.12.2012 Overview Introduction OS and RTOS RTOS taxonomy and architecture Application areas Mixed-criticality systems Examples:
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring
Building Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,
Security in SCADA solutions
Security in SCADA solutions Green Hills Software Peter Hoogenboom Engineering Manager - EMEA 2011 Green Hills Software D&E Event, 22 Sep 2011, Evoluon Eindhoven (NL) Slide 1 Security in SCADA solutions
Software Verification and System Assurance
Software Verification and System Assurance John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Verification
SYSTEMS SECURITY ENGINEERING
SSE-100-1 NATIONAL SECURITY AGENCY INFORMATION ASSURANCE GUIDANCE FOR SYSTEMS BASED ON A SECURITY REAL-TIME OPERATING SYSTEM SYSTEMS SECURITY ENGINEERING NATIONAL SECURITY AGENCY 9800 SAVAGE ROAD, SUITE
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Leveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
vsphere Client Hardware Health Monitoring VMware vsphere 4.1
Technical Note vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Purpose of This Document VMware vsphere provides health monitoring data for ESX hardware to support datacenter virtualization.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
New Challenges In Certification For Aircraft Software
New Challenges In Certification For Aircraft Software John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Aircraft Software Certification 1 Overview The basics
Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems
Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems 23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
IO Visor: Programmable and Flexible Data Plane for Datacenter s I/O
IO Visor: Programmable and Flexible Data Plane for Datacenter s I/O LINUX FOUNDATION COLLABORATIVE PROJECTS Introduction Introduction As an industry, we have been building datacenter infrastructure for
Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk
About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
Digital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
Achieve Automated, End-to-End Firmware Management with Cisco UCS Manager
Achieve Automated, End-to-End Firmware Management with Cisco UCS Manager What You Will Learn This document describes the operational benefits and advantages of firmware provisioning with Cisco UCS Manager
ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
How To Build A Financial Messaging And Enterprise Service Bus (Esb)
Simplifying SWIFT Connectivity Introduction to Financial Messaging Services Bus A White Paper by Microsoft and SAGA Version 1.0 August 2009 Applies to: Financial Services Architecture BizTalk Server BizTalk
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia
sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia 1 OS Trade-Offs Usability Minix Android Linux Trustworthiness Minix Android L4 sel4 Performance Linux L4 sel4 2015 Gernot
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Boeing B-777. 29.1 Introduction. 29.2 Background. Michael J. Morgan
29 Boeing B-777 Michael J. Morgan Honeywell 29.1 Introduction 29.2 Background 29.3 Boeing 777 Airplane Information Management System (AIMS) 29.4 Cabinet Architecture Overview 29.5 Backplane Bus 29.6 Maintenance
ETERNUS CS High End Unified Data Protection
ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
A Project Document of the Advanced Transportation Controller Joint Committee. APIVS CONOPS v02.04
A Project Document of the Advanced Transportation Controller Joint Committee APIVS CONOPS v02.04 Advanced Transportation Controller (ATC) Application Programming Interface (API) Validation Suite (APIVS)
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
ARINC 653. An Avionics Standard for Safe, Partitioned Systems
ARINC 653 An Avionics Standard for Safe, Partitioned Systems 1 Courtesy of Wind River Inc. 2008 IEEE-CS Seminar June 4 th, 2008 Agenda Aerospace Trends IMA vs. Federated ARINC 653 Main concepts Safety
The evolving ARINC 653 standard and it s application to IMA
The evolving ARINC 653 standard and it s application to IMA Alex Wilson Senior Program Manager Wind River November 13 th 2007 IMA and ARINC 653 Agenda DO-297 Certification of IMA under DO-297 Conclusions
Ensim VoIP White Paper
Ensim White Paper Key Drivers for Ensim Ensim solves the critical customer pains and barriers to rapid, scalable and ultimately successful hosted deployments. Leveraging Ensim, the Carrier is empowered
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
On-board Software Reference Architecture for Payloads
On-board Software Reference Architecture for Payloads Presenters Victor Bos, phone: +358 400897907, email: [email protected] Adam Trcka, phone: +420 736650822, email: [email protected] Introduction
Establishing Great Software Development Process(es) for Your Organization. By Dale Mayes [email protected]
Establishing Great Software Development Process(es) for Your Organization By Dale Mayes [email protected] Class: ETP-410 Embedded Systems Conference San Francisco 2005 Abstract: There are
