Trusted Virtual Datacenter Radically simplified security management
|
|
|
- Neal Thornton
- 10 years ago
- Views:
Transcription
1 IBM T. J. Watson Research Center Trusted Virtual Datacenter Radically simplified security management Stefan Berger, Ramón Cáceres, Dimitrios Pendarakis, Reiner Sailer, Ray Valdez Secure Systems Department, T.J. Watson Research Center 2007 IBM Corporation
2 Security Opportunity Prologue Significant Challenges Status quo approach to IT and business security is too complex, is not measurable, will not scale Lack of secure foundation for dynamic enterprise environments Synergistic Strategy Leverage emerging trusted computing technologies (TCG) and commoditization of virtualization (Intel / AMD, EMC, Microsoft, IBM) Near-term: stronger guarantees position security as an enabler Longer-term: radically simplified IT security management 2005 IBM Corporation 2
3 Trusted Computing and Virtualization Timeline IBM IMA for Linux MS NGSCB 1.. IBM shype IBM vtpm NAC MS Vista bitlocker TCG TPM1.1 SRTM TCG TPM1.2 DRTM AMD SVM SKINIT Intel LT SENTER IBM Corporation 3
4 Virtualization Landscape at a Glance -level (or middleware-level) virtualization E.g., Java Virtual Machine, Softricity (Microsoft SoftGrid), Thinstall Operating system-level virtualization E.g., Linux VServers, Solaris Containers / Zones, Virtuozzo Hypervisor-based virtualization Type 1: VMware ESX, Microsoft Viridian, Xen, PHYP, PR/SM Type 2: VMware Workstation, Microsoft Virtual PC, KVM 2005 IBM Corporation 4
5 Classic Type 1 Hypervisor Virtual Machines Guest Kernel Guest Kernel Guest Kernel Hypervisor Hardware Virtualizes hardware CPU and I/O devices 2005 IBM Corporation 5
6 Virtualization-based Security & Systems Management Virtual Resources Physical Resources Trusted Virtual Data Center (TVDc) Market Analysis Security Underwriting Centralized IT Security management TVD: Grouping of VMs and resources that support common objective (customer workloads, etc.) Abstracting the physical infrastructure (platform independence, scalability) Policy-driven (consistent security configuration and management) Systems View View TVDc View View Distributed Enforcement Very strong, coarse-grain security guarantees cannot be bypassed by VMs Single data center security policy across different platforms and hypervisors Containment (viruses, break-ins) & Trust Hypervisor Hypervisor Hypervisor TVDc 2005 IBM Corporation 6
7 shype: Enabling Trusted Virtual Datacenters TVDc (manages) Workload Isolation + Integrity Radically Simplified WL-Management Managed Services shype (controls sharing) Human Coalition Resources Payroll Work Load Xen VMM (virtualizes + isolates) VM 2005 IBM Corporation 7
8 Trusted Virtual Datacenter Simplifies Security Management Systems View Virtual Domain View Guard-VM TVDc Red = Acct. Green = HR. Blue = Dev. Trust Isolation Integrity 2005 IBM Corporation 8
9 Trusted Virtual Data Center Value Proposition IBM TVDc: Radically Simplified Security Management Isolation Management Integrity Management Enforces restrictions on administration and data sharing: Who manages what: independent admin for Hertz and Avis accounts What can run together: ensure air-gaps between strongly competing workloads Workload and data isolation (malware confinement) Maintains software inventory and acts as an early warning system for anomalies; detect and report: What is running in each VM If VMs/Systems are correctly configured If VMs are up-to-date with patches TVDc reduces the risk of security exposures TVDc enables consistent, policy-driven enforcement 2005 IBM Corporation 9
10 Secure Hypervisor Architecture (shype) VM Auditing, Monitoring, Metering, Linux MS Windows Secure Services Secure (isolated) services e.g. Policy Management Resource control and metering Access control between partitions Xen / shype Hardware Isolation between partitions Attested boot and run-time (TCG/TPM, IMA) Sailer, Sailer, Jaeger, Jaeger, Valdez, Valdez, Cáceres, Cáceres, Perez, Perez, Berger, Berger, Griffin, Griffin, van van Doorn: Doorn: Building Building a a MAC-based MAC-based Security Security Architecture Architecture for for the the Xen Xen Opensource Opensource Hypervisor. Hypervisor st st ACSAC, ACSAC, IBM Corporation 10
11 shype Access Control Architecture (Example: Xen) VM Linux Xen / shype Hardware Hypervisor security hooks MS Windows Callbacks Dom0 Secure (Management) Services ACM Flexible framework: Supports Multiple Policies Access Control Module Implements Policy Model Hypervisor Security Hooks mediate inter-vm communication + resource access interact with ACM for access decision Implemented for Xen, PHYP, rhype in various stages 2005 IBM Corporation 11
12 1. Centralized Isolation Management Policy authoring and management Define security labels and anti-collocation rules Revision-based policy management = Accounting = Human Resources = Development Anti-Collocation:{, },... Labeling Systems, VMs and resources Label-based management Restrict Admins to manage a set of security labels Restrict configuration choices based on policy 2005 IBM Corporation 12
13 2. Distributed Isolation Enforcement at Run-time (Secure hypervisor extensions shype/acm) 1. Control Sharing 2. Control what a system can run 3. Enforce rules for anti-collocation Xen: Xen: Integrated into into Opensourcsource distribution Open- Anti-Collocation:{, } t PHYP PHYP Access Control Module (research prototype) 2005 IBM Corporation 13
14 TVDc TVDc Managing Managing Sailer -Security IBM Security T. J. in in Watson the the Trusted Trusted Research Virtual Virtual Datacenter Center Datacenter in in ACM ACM SIGOPS SIGOPS Operating Operating System System Review Review Special: Special: IBM IBM Research. Research. Vol Vol 42, 42, Issue Issue 1, 1, January January Berger, Berger, Cáceres, Cáceres, Pendarakis, Pendarakis, Perez, Perez, Sailer, Sailer, Schildhauer, Schildhauer, Srinivasan, Srinivasan, Valdez. Valdez. TVDc Network Isolation Blade 1 Blade 2 VM 1 VM 2 VM VM 3 VM 4 VM 5 VMM X VMM Virtual LAN 1 Virtual LAN 1 Virtual LAN 2 Virtual LAN Label Label VMs VMs + VLANs VLANs VMM VMM enforces: enforces: VMs VMs VLANs VLANs Hardware Hardware VLAN VLAN switch switch enforces: enforces: Blades Blades VLANs VLANs Virtual LAN 1 Virtual LAN 2 Network Switch 2005 IBM Corporation 14
15 Trusted Virtual Domains Isolation and Trust Authentication: systems and workloads Attestation: mutually verifiable environments Mediated Communications: transparent protection, authorization and audit Isolation: protect against attacks and limit spread of damage 2005 IBM Corporation 15
16 Distributed Trusted Computing Base Putting Access Control and Integrity Measurement together Establish trust enabling collaboration across multiple platforms Are P1 and P2 mutually trusted (TCB) Are policies A and B compatible? Are policies uniformly enforceable? vm4 vm5 VM change / compromise B Platform P1 vm1 vm2 vm3 A Platform P2 TCB change / compromise McCune, McCune, Berger, Berger, Cáceres, Cáceres, Jaeger, Jaeger, Sailer: Sailer: Shamon A System for Distributed Mandatory Access Control. 22 nd ACSAC, Shamon [email protected] A System for Distributed Mandatory Access Control. 11/7/ nd ACSAC, IBM Corporation 16
17 Trusted Platform Module (TPM) Winbond Infineon Atmel Trusted Computing in today s s world is largely synonymous with a use that involves the Trusted Platform Module (TPM) TPM is a passive storage device that has some interesting properties: You cannot remove data once you ve written it to the TPM You can retrieve an aggregate of the data from the TPM that is signed s by that unique key The TPM provides sealed storage Storage root key protection igned by that TPM s 2005 IBM Corporation 17
18 Integrity Measurement Integrity & Attestation Provide reliable runtime integrity guarantees Certificates provide identity and secure tunnel But does the remote system currently satisfy security-related requirements? execute measure Leverage Trusted Platform Module (TPM) / Core Root of Trust for Measurement Remotely attest software-stack Detect cheating & compromise (load guarantees) Bind sensitive data to endpoint (certificates etc.) Non-intrusive / negligible overhead Implemented for Linux in 2003/2004 IBM Integrity Measurement Architecture (IMA) s OS OS Loader Core Root of Trust Sailer, Sailer, Zhang, Zhang, Jaeger, Jaeger, Doorn. Doorn. Design Design and and Implementation Implementation of of a a TCG-based TCG-based Integrity Integrity Measurement Measurement Architecture. Architecture. Usenix Usenix Security Security Symposium, Symposium, August, August, IBM Corporation 18
19 Trusted Computing uses real-time attestation to establish sufficient facts about a system, such as software integrity, to interpolate from its past to its future behavior. 1. Local integrity verification Does my system have integrity? Is it save to log in and use? (Kiosk, Desktop, ) 2. Remote integrity verification Does their system have integrity? Is it save to use? (online services, ) What about its users? 1. How is my system doing? 3. Use Service 2. How is their system doing? 2005 IBM Corporation 19
20 Integrity Measurement Architecture (IMA) Attesting System Measurements Verifying System Deduce System Properties Data Config data Boot- Process TCG Grub Kernel Real System Program... IMA Kernel module SHA1(Boot Process) SHA1(Kernel) SHA1(Kernel Modules) SHA1(Program) SHA1(Libraries) SHA1(Configurations) SHA1(Structured data) TPM-Signed PCR Integrity Value Analysis Inferred System Known Fingerprints (1) Measurement (2) Attestation (3) Verification 2005 IBM Corporation 20
21 Berger, Berger, Cáceres, Cáceres, Goldman, Goldman, Perez, Perez, Sailer, Sailer, van van Doorn Doorn vtpm: vtpm: Virtualizing Virtualizing the the Trusted Trusted Platform Platform Module. Module. 15th 15th USENIX USENIX Security Security Symposium, Symposium, July July Virtual TPMs Enable VM Integrity Attestation IMA-enabled IMA-enabled Guest Kernel OS IMA-enabled IMA-enabled Guest Kernel OS IMA-enabled Virtual TPMs Support current IMA via vtpms (flexible, scalable) Policy Manager Measure HW, hypervisor, and critical services Secure Hypervisor ACM Hardware Core Root of Trust 2005 IBM Corporation 21
22 vtpm+ima: Focus on Solving Real Problems Configuration Management Configure server classes Verify configuration against software stack Problem Management Automatically detect and isolate real problems Direct intelligence towards those real problems Fix problems efficiently Verify that problems no longer exists System B System A HELP! #000: BC55F0AFE013C...E6CFAA2B4D2AB boot_aggregate (bios + grub stages) #000: BC55F0AFE013C...E6CFAA2B4D2AB boot_aggregate (bios + grub stages) #001: A8A865C7203F2...0A2289F7D035B grub.conf (boot configuration) #001: A8A865C7203F2...0A2289F7D035B grub.conf (boot configuration) #002: 1238AD50C652C...87D06A99A22D1 vmlinuz bk2-lsmtcg #002: 1238AD50C652C...87D06A99A22D1 vmlinuz bk2-lsmtcg #003: 84ABD C B4E5BDA4F init (first process) #003: 84ABD C B4E5BDA4F init (first process) #004: 9ECF02F90A2EE...5DE4798A1BE3D ld so (dynamic linker) #004: 9ECF02F90A2EE...5DE4798A1BE3D ld so (dynamic linker) #005: 1238AD50C652C...87D06A99A22D1 Linux Root Kit #005: 1238AD50C652C...87D06A99A22D1 Linux Root Kit #006: 84ABD C B4E5BDA4F Unknown Program #006: 84ABD C B4E5BDA4F Unknown Program Runs old patch-level #000: BC55F0AFE013C...E6CFAA2B4D2AB boot_aggregate (bios + grub stages) #000: BC55F0AFE013C...E6CFAA2B4D2AB boot_aggregate (bios + grub stages) #001: A8A865C7203F2...0A2289F7D035B grub.conf (boot configuration) #001: A8A865C7203F2...0A2289F7D035B grub.conf (boot configuration) #002: 1238AD50C652C...87D06A99A22D1 vmlinuz bk2-lsmtcg #002: 1238AD50C652C...87D06A99A22D1 vmlinuz bk2-lsmtcg #003: 84ABD C B4E5BDA4F init (first process) #003: 84ABD C B4E5BDA4F init (first process) #004: 9ECF02F90A2EE...5DE4798A1BE3D ld so (dynamic linker) #004: 9ECF02F90A2EE...5DE4798A1BE3D ld so (dynamic linker) #005: 1238AD50C652C...87D06A99A22D1 Illegal Config /etc/http.conf #005: 1238AD50C652C...87D06A99A22D1 Illegal Config /etc/http.conf #006: 84ABD C B4E5BDA4F Old HTTP Server 1.1 #006: 84ABD C B4E5BDA4F Old HTTP Server IBM Corporation 22
23 Research Challenges around TVDc Technologies Controlled Sharing Between TVDc Guard systems Integrity Measurement Architecture Run-time guarantees (extend load-time guarantees) Property determination and fingerprint management Distributed Mandatory Access Control Policy composition & change management Virtual TPM Safely migrate/save/restore the virtual root of trust 2005 IBM Corporation 23
24 Trusted Virtual Data Center Summary TVDc is designed to achieve simplified security management enterprise-level assurance TVDc creates confined workload domains to enable independent trust and security properties More on our department team page: secure_systems_department or: TVDc TVDc Managing Managing Security Security in in the the Trusted Trusted Virtual Virtual Datacenter Datacenter in in ACM ACM SIGOPS SIGOPS Operating Operating System System Review Review Special: Special: IBM IBM Research. Research. Vol Vol 42, 42, Issue Issue 1, 1, January January Berger, Berger, Cáceres, Cáceres, Pendarakis, Pendarakis, Perez, Perez, Sailer, Sailer, Schildhauer, Schildhauer, Srinivasan, Srinivasan, Valdez. Valdez IBM Corporation 24
25 Resources TVDc building blocks freely available: Integrity Measurement Architecture (IMA) Source code: Project page: Virtual Trusted Platform Module (vtpm) Source code in Xen: Project page: shype Access Control Architecture Source code in Xen: Xen User Guide: Project page: IBM Corporation 25
Security for the cloud infrastructure: Trusted virtual data center implementation
Security for the cloud infrastructure: Trusted virtual data center implementation The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Management of the Access Control Module through the Xen-API
IBM T. J. Watson Research Center Management of the Access Control Module through the Xen-API Stefan Berger, Reiner Sailer, Ronald Perez, Ramón Cáceres IBM T. J. Watson Research Center, NY 2006 IBM Corporation
Trusted Virtual Machine Management for Virtualization in Critical Environments
Trusted Virtual Machine Management for Virtualization in Critical Environments Khan Ferdous Wahid Fraunhofer SIT Rheinstraße 75 64295 Darmstadt Germany www.sit.fraunhofer.de [email protected]
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
Security Challenges in Virtualized Environments
Security Challenges in Virtualized Environments Joanna Rutkowska, Invisible Things Lab Confidence 2008, Krakow, Poland, May 15th, 2008 1 Virtualization-based MALWARE 2 Using Virtual Machines for ISOLATION
Survey On Hypervisors
Survey On Hypervisors Naveed Alam School Of Informatics and Computing Indiana University Bloomington [email protected] ABSTRACT Virtual machines are increasing in popularity and are being widely adopted.
Security Considerations for Virtual Platform Provisioning
Security Considerations for Virtual Platform Provisioning Mudassar Aslam, Christian Gehrmann Swedish Institute of Computer Science (SICS) Isafjordsgatan 22, SE-164 29 Kista, Sweden {mudassar.aslam, chrisg}@sics.se
SECURITY IN OPEN SOURCE VIRTUALIZATION
SECURITY IN OPEN SOURCE VIRTUALIZATION S.SELVAKUMAR B.Tech., IFET College of Engineering, - [email protected] ABSTRACT: As virtual machines become increasingly commonplace as a method of separating
vtpm: Virtualizing the Trusted Platform Module
vtpm: Virtualizing the Trusted Platform Module Stefan Berger Ramón Cáceres Kenneth A. Goldman Ronald Perez Reiner Sailer Leendert van Doorn {stefanb, caceres, kgoldman, ronpz, sailer, leendert}@us.ibm.com
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot
presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
managing the risks of virtualization
managing the risks of virtualization Chris Wraight CA Technologies 28 February 2011 Session Number 8951 abstract Virtualization opens the door to a world of opportunities and well managed virtualization
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Establishing and Sustaining System Integrity via Root of Trust Installation
Establishing and Sustaining System Integrity via Root of Trust Installation Luke St.Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel Systems and Internet Infrastructure Security Laboratory The Pennsylvania
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Distributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE
Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment
Regular Paper Journal of Computing Science and Engineering, Vol. 5, No. 4, December 2011, pp. 331-337 Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected]
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected] What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
What is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors Soltesz, et al (Princeton/Linux-VServer), Eurosys07 Context: Operating System Structure/Organization
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Professional Xen Visualization
Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization
SUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia
OPEN SOURCE VIRTUALIZATION TRENDS SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia WHAT I WILL BE TALKING ON? Introduction to Virtualization Full Virtualization, Para Virtualization
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
vtpm: Virtualizing the Trusted Platform Module
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA vtpm: Virtualizing the
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
Virtualizare sub Linux: avantaje si pericole. Dragos Manac
Virtualizare sub Linux: avantaje si pericole Dragos Manac 1 Red Hat Enterprise Linux 5 Virtualization Major Hypervisors Xen: University of Cambridge Computer Laboratory Fully open sourced Set of patches
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
CS 155 Spring 2010. TCG: Trusted Computing Architecture
CS 155 Spring 2010 TCG: Trusted Computing Architecture Background! TCG consortium. Founded in 1999 as TCPA. Main players (promotors):! Goals: AMD, HP, IBM, Infineon, Intel, Lenovo, Microsoft, Sun (>200
Cloud Computing for a Smarter Planet Virtualization
Cloud Computing Workshop - Uni Stuttgart Cloud Computing for a Smarter Planet Virtualization Andreas Maier, IBM ([email protected]) November 2010 Contributors to this presentation Jim Rymarczyk, IBM Fellow,
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
The future is in the management tools. Profoss 22/01/2008
The future is in the management tools Profoss 22/01/2008 Niko Nelissen Co founder & VP Business development Q layer Agenda Introduction Virtualization today Server & desktop virtualization Storage virtualization
Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore
Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
Building a MAC-Based Security Architecture for the en Open-Source Hypervisor Reiner Sailer Trent Jaeger Enriquillo Valdez Ramón Cáceres Ronald Perez Stefan Berger John Linwood Griffin Leendert van Doorn
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
Virtualization Overview
VMWARE W HWHITE I T E PPAPER A P E R Virtualization Overview 1 Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
