Patterns for Secure Boot and Secure Storage in Computer Systems
|
|
|
- Toby Hodge
- 10 years ago
- Views:
Transcription
1 Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany Abstract Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage. Keywords-security patterns; trusted computing; secure boot; secure storage; I. INTRODUCTION The literature on security patterns includes numerous patterns related to operating systems, e.g., concerning authentication and access control. However, until now, Trusted Computing (TC) has received very little attention from the pattern community. TC aims to employ a combination of hardware security mechanisms and software to address security problems that cannot be solved by software alone. Particularly relevant among these are security threats related to malicious software, such as Trojan horses and viruses. By now, there is not only a tremendous amount of research in this field, but TC concepts can also be found in a wide variety of products, ranging from embedded devices, such as mobile phones, to servers equipped with expensive tamperresistant secure co-processors. The best-known approach to TC is based on the specifications released by the Trusted Computing Group (TCG) [1]. In this paper, we present the patterns underlying two fundamental TC concepts: secure boot and secure storage. Secure boot guarantees that violations of integrity properties of the software stack that is booted on a platform can be prevented, i.e., software that violates the integrity properties cannot be loaded. A variant of this pattern, termed authenticated boot, does not prevent software from being loaded, but allows reliable verification of the load-time integrity of the software that has been booted later on. Secure boot is a building block at the heart of many TC-based solutions (including implementations of secure storage). Secure storage is a crucial application-level requirement in many scenarios. Simple encryption is often not enough to protect sensitive data: it must also be ensured that an attacker cannot obtain the decryption key. Secure storage solves this issue by using hardware (and software) to enforce access restrictions on the stored data. Before access is granted to an application, the integrity of the software is verified. Secure storage and secure boot are essential concepts for TC systems. For instance, a Common Criteria protection profile for security kernels with TC support has been evaluated and certified recently [2], which also includes secure boot and secure storage. The security patterns described here could be helpful to implement these features for security kernels that aim to comply with this protection profile. This paper describes the common pattern underlying various existing realizations of secure boot [3], [4], [1], [5], and of secure storage [4], [1], [5]. II. SECURE BOOT PATTERN Intent: This pattern addresses how to ensure that violations of integrity properties of the software stack that is booted on a platform can be either prevented (secure boot) or detected (authenticated boot). A. Example Consider a user who wants to use a computing device that was left unattended or that was used by another person before. How can the user be sure that the system software is in the intended operational state, i.e., that no critical component of the operating system or other software applications has been modified in a malicious or unauthorized way? Typically, a file integrity checker program can check the integrity of system and application files. However, any file integrity checker program must rely on trusted reference values and that those values have not been tampered with. Moreover, the user wants also to be sure that the file integrity checker itself is not tampered with or deactivated at all. B. Context Users of security-sensitive applications want to be sure about the operational integrity of their applications and execution environment. Unauthorized changes to the application code or the operating system may lead to unintentional program behavior or violation of security goals. Users trust the hardware, but they need a way to verify that the software loaded on this hardware has not been tampered with.
2 C. Problem On conventional platforms, software can be manipulated or exchanged. Local users cannot verify if they are interacting with the correct software, and remote platforms cannot verify the software of their communication partner. Before applications can be used on a computer system, the system has to be bootstrapped. Typically, the hardware starts by loading a piece of code (firmware, or BIOS on PCs), which in turn loads the bootloader from a pre-defined place from main storage (the disk drives). The bootloader loads the operating system kernel, and the operating system kernel loads system services, device drivers, and other applications. At any stage of the bootstrap process, software components could have been exchanged or modified by another user or by malicious software that has been executed before. The following forces have to be resolved: You want to ensure the integrity of the loaded software on the system, otherwise malicious software could run without being noticed. You want the computer system to always boot in a welldefined secure state. Otherwise, attackers could violate security goals by putting it into an insecure state. You want to allow modifications of the operating system or application binaries. Otherwise, software installation and updates would be problematic. D. Solution Based on the assumption that the hardware of the computer system is correct, the integrity of lower layer boot modules is checked and control is transferred to the next stage if and only if the integrity of that stage is valid. Hence, every stage is responsible for checking the integrity of the next stage. Integrity checking can be performed in different ways: two common methods are comparing hash values or verifying digital signatures. In the first case, hash values of program binaries are computed using a cryptographic hash function (e.g., SHA-1) and compared to reference values. If the computed value does not match the reference value, the binary has been modified. In the second case, each program binary is cryptographically signed by its vendor with a signature key that is only known to the vendor. The signature of the binary can be verified to check that it has not been modified since its signature generation. If one stage detects an integrity violation, execution is stopped and the system halts. The sequence of these integrity checks builds the chain of trust. Thus, the user knows implicitly that the system has booted valid program code if it is running at all. If the first module of such a sequence of integrity checks has already been modified in an unauthorized or malicious way, then the user cannot trust on subsequent integrity checks. The modified module could cheat or even skip any integrity checking. Therefore, the very first boot module is the root of trust for the whole chain of integrity measurements and needs to be protected against unauthorized modifications. The integrity verification data (hash reference values, or signature verification keys) must be protected, too. To protect the initial boot module (and its verification data) and to reliably build the chain of trust, the root of trust is realized in hardware. Hardware is assumed to be more secure than software because it cannot be changed or read out as easily as software. Moreover, hardware security modules can be protected against various physical attacks at least to some extend. 1) Structure: Figure 1 shows the elements of the Secure Boot pattern. The Root of Trust for Measurement is the first module in the bootstrap chain and realized and protected by hardware. A Bootstrap Module has a link to the next Bootstrap Module, which is measured for its integrity (typically, by computing a hash value) before control is transferred. Each Bootstrap Module has to maintain (and protect) its corresponding integrity verification data. The verification data of the Root of Trust module is also protected by the hardware, e.g., stored in protected memory registers. Figure 1. Elements of the Secure Boot pattern. Usually, the last Bootstrap Module is the operating system, which can load several different applications and not only one. In addition, applications can also start other applications or load libraries. In this case, applications also have to measure the integrity of the corresponding components. 2) Dynamics: When the computer system is started, the Root of Trust for Measurement is executed. It loads and measures the program code of the subsequent Bootstrap Module, and verifies the integrity of this code. If this fails, the Root of Trust stops the execution and the system is halted. Otherwise, the Root of Trust transfers control to the subsequent Bootstrap Module. The Bootstrap Module loads and measures the code of the next Bootstrap Module, and verifies the integrity of this code based on the verification data. If this fails, the system is halted, otherwise control is transferred to the next Bootstrap Module. This continues until the last module in the chain of trust has received control (typically, applications). E. Example Resolved Based on secure boot, the user can be sure that the correct system has been booted on the computer without
3 changes, because any modifications would have caused the boot process to abort. Moreover, it is not possible to boot a completely different system, because the boot chain starts with a root of trust protected by hardware. F. Variants Authenticated boot refers to an architecture that ensures that local or remote parties can verify properties of the software that has been booted. While secure boot interrupts the boot process if a modification of the loaded modules is detected, authenticated boot continues the boot process even in that case. However, any modification is detected and recorded securely for later inspection or verification. Authenticated boot can be implemented using a hardware security module in the following way: The first module in the bootstrap chain is trusted by assumption (e.g., implemented in hardware), and measures the integrity of the next module. This integrity measurement is then stored in protected hardware registers. The measurements taken at load-time of the software can later be reported by the security module. For this, the module signs the stored values. G. Known Uses There are various implementations of secure boot: AEGIS [3] is a secure boot architecture for PCs, where a chain of trust is constructed at boot time by hashing components, and comparing the result with digitally signed reference values. An expansion card implements the necessary hardware root of trust for measurement. The Cell Broadband Engine processor [4] implements a secure boot mechanism to load application code into an isolated execution mode of one of its multiple processor cores. The Cell processor provides a hardware root of trust that verifies the integrity of the loaded code cryptographically. Only if the verification succeeds, the code is executed. Moreover, every time an application wants to use this isolated execution environment, it has to pass the secure boot process. Within the isolated mode, the application code is protected from software running on other cores and even from the operating system running on the supervisor core. The Cell Broadband Engine is used in IBM Cell blade servers and also in the Sony Playstation3 game console. For mobile devices, requirements for secure boot have been collected in Open Mobile Terminal Platform (OMTP) recommendations [5] that take into account different industrial standards and specifications, including specifications from the Open Mobile Alliance (OMA), the TCG, and the 3rd Generation Partnership Project (3GPP). The document describes the mechanisms for secure boot and authenticated boot in an abstract way, and hardware manufacturers implement them differently. There is a well-known example for authenticated boot: The TCG specified authenticated boot based on the TPM [1]. The TPM contains special-purpose registers called Platform Configuration Registers (PCRs) that can be used to store hash values. These PCRs cannot be overwritten but only extended by computing hash values. Starting from the root of trust for measurement, all software modules in the boot chain of a TCG-enabled PC (BIOS, boot loader, operating system kernel, etc.) are first hashed, a PCR is extended accordingly, and then control is transferred. By this, the entire bootstrap chain is measured and recorded in PCRs. The TPM also offers a function TPM_Quote, where the recorded hash values are digitally signed and reported to the caller. H. Consequences The benefits from the secure boot pattern include: The software integrity state is verified at boot time, and only software that passed this verification is booted. With the variant authenticated boot, it is possible to boot any software, however, the integrity state of the software at boot time can be checked later. The liabilities from the secure boot pattern include: Integrity verification data must be installed and updated (e.g., due to revocation) in a secure fashion (preserving integrity, authenticity, and freshness of the data). Software updates could be an issue, because after an update, the integrity state is changed (the software is modified). Hence, specific mechanisms for updates are needed to allow the system to boot properly afterwards. The integrity of modules during runtime needs to be ensured by additional mechanisms. The integrity verification of large modules (e.g., an entire OS) may be time consuming. Hence, the OS may require adaption to include integrity verification of its modules and applications. This pattern adds complexity and overhead. It needs to be coordinated with the other protection mechanisms. I. Related Patterns Boot Loader [6] describes the boot process as a sequence of single bootstrap stages. Each stage loads the image of the next one and transfers control after validation of the image according to certain requirements, typically verifying error correction checksums. In contrast, Secure Boot requires a secure verification of the integrity of the image in each stage, e.g., based on cryptographic hash functions. In addition, Secure Boot defines a root of trust for measurement and requires its protection by trusted hardware to establish a chain of trust throughout all stages. Authenticator [7] verifies the identity of a subject and creates a proof of identity for later use, e.g., in access control decisions. However, it is typically intended to authenticate users and it does not include a protection for the Authenticator itself. Hence, it cannot provide a chain of trust. But
4 Authenticator can be combined with Secure Boot to extend the proof of identity to the underlying system components. In [8], the authors introduce patterns for TPM usage. Their patterns concern the communication of software with the TPM, whereas the Secure Boot pattern describes more abstract concepts that can be realized based on TPMs, or based on alternatives, such as secure co-processors. III. SECURE STORAGE PATTERN Intent: Secure storage provides confidentiality and integrity for stored data, and additionally enforces access restrictions on entities that want to access data. In particular, the secure storage can verify the integrity of software components, and it grants access to the data only to authorized, unmodified components that meet these restrictions. A. Example Consider the problem of storing passwords (e.g., for web services) securely on a computer. Users want to protect their passwords, such that attackers who might install malicious software on the computer (e.g., phishers using malware) cannot access them. In this case, simply encrypting the passwords with a passphrase does not help: The software installed by the attacker might look exactly like the legitimate software (i.e., the password manager they normally use) to users, so they enter their passwords. Thus, the attacker obtains the passphrase, and can decrypt and steal all passwords. We need to store passwords in such a way that only the legitimate password manager can access them. B. Context You need to provide storage that protects the confidentiality and integrity of stored data, and which verifies the integrity of the software before granting access to the data. You trust the hardware, but you need to be able to verify that only authorized, unmodified software can access data stored in the secure storage. C. Problem Cryptographic techniques exist to protect the confidentiality and integrity of data, e.g., encryption and digital signatures. However, the secret keys need to be protected against unauthorized usage. Operating system access controls are not sufficient because the access control component could be manipulated or replaced by an attacker. The following forces have to be resolved: You need to protect the confidentiality and integrity of data, even when the system is not running. Otherwise, an attacker could read or modify protected data. You need to protect secret cryptographic keys from unauthorized access and usage. Otherwise, an attacker could use the keys, e.g., to decrypt confidential data. You want to allow modifications of the operating system or application binaries. Otherwise, software installation and updates would be problematic. D. Solution A Root Key is used to encrypt and decrypt data and other keys (which in turn can protect data or other keys). The usage of the Root Key is controlled by a Root Key Control component. Root Key and Root Key Control are both protected by trusted hardware, i.e., the secret part of the Root Key never leaves the hardware, and Root Key Control cannot be manipulated or replaced by users or other software programs. Root Key Control verifies the integrity of Applications and their Execution Environment before it performs cryptographic operations on behalf of an Application. 1) Structure: Figure 2 shows the elements of the Secure Storage pattern. Root Key Control has solely access to the Root Key, and both are protected by hardware. The Root Key can protect an arbitrary amount of Data. A special case of Data are Application Keys, which Applications can use to protect their application-specific data. The Root Key Control maintains a mapping of what Data can be accessed by which Application. It uses integrity verification data (hash reference values, or digital signatures) to verify the integrity of Applications and their Execution Environment. Figure 2. Elements of the Secure Storage pattern. 2) Dynamics: When an Application requests to access Data, the Root Key Control verifies first the integrity of the Application and of the software components of the Execution Environment the Application is executed in (typically, the operating system components). Only if the integrity verification succeeds, Root Key Control uses the Root Key to decrypt (or encrypt) the Data. Note that the Root Key is never passed to an Application. Instead, the Root Key Control performs the corresponding encryption and decryption operations and only returns the result. E. Example Resolved Passwords are stored in secure storage, ensuring that the integrity of the application and its trusted computing base (TCB) are verified before the application can access
5 the passwords. Access is granted only to the authorized password manager, and only if it is running in a secure execution environment on a secure operating system. It is important to include the TCB (here: operating system) into the verification process, because on an insecure system, malware might be able to read the memory of the password manager and hence gain access to the passwords. F. Known Uses There are various implementations of Secure Storage: The Cell processor [4] features storage that can only be accessed when the processor is in a secure state. In this state, software that is running on the processor has been measured by a secure boot mechanism. This way, the Cell processor can provide secure storage. TPM sealing [1] is a mechanism specified by the TCG and implemented in the TPM. With this functionality, a key which can be used only inside the TPM can be restricted in its use by defining specific values for the PCRs. Since the PCRs securely store the recorded measurements from the authenticated boot process, usage of the key can be restricted to software that passes the integrity verification. The OMTP TR1 recommendation [5] includes detailed requirements for secure storage on mobile devices. G. Consequences The benefits from the secure storage pattern include: Only software where the integrity verification succeeded can access the protected data. In combination with a secure operating system, this can prevent malware from accessing sensitive data. Data can be stored on a system, such that it can be accessed only when the authorized operating system and software has been started. The liabilities from the secure storage pattern include: Backup strategies become more involved, because the encryption keys are protected in hardware. Data must be encrypted with a different key for the backup system, or a mechanism is needed to backup hardware-protected keys to other secure hardware. After an update, software cannot access protected data anymore, if no additional mechanisms are in place. Thus, software updates become more difficult. This pattern adds complexity and overhead. It needs to be coordinated with the other protection mechanisms. H. Related Patterns Secure Storage requires Secure Boot to protect the integrity verification data. If Applications and their Execution Environment are also part of the Secure Boot, then Root Key Control can rely on the integrity verification during Secure Boot and does not need to perform it explicitly. Secure Storage also requires Controlled Virtual Address Space [7] for providing isolated memory for each process to protect private data against unauthorized access. Otherwise malicious processes could wait until the authorized process has access to the decrypted data, and simply copy the data from the memory of this process. Information Obscurity [7] also addresses how to protect data stored on a system from unauthorized access. Application components obscure data by applying encryption, and encryption keys are hidden in a protected location. Secure Storage describes how to realize such a protected location. In Controlled Execution Environment [7], a process also requests to access a protected resource, and the access is granted or denied based on the access rights of the process. However, the protection of such resources is based on access control rules and requires the underlying Reference Monitor [7] of the operating system to be trusted. In contrast, Secure Storage protects the data (using a trusted component such as a security module) even if the operating system has been manipulated or completely replaced. Moreover, granting access in Secure Storage is bound to the integrity of the requesting program and its execution environment. IV. CONCLUSION Secure boot and secure storage are fundamental concepts of Trusted Computing that are vital to a variety of security solutions. In this paper, we introduced the common patterns that are at the core of different implementations of these concepts. We expect our patterns to become a valuable addition to existing operating system security patterns. REFERENCES [1] Trusted Computing Group, TCG TPM Specification, Version 1.2, Revision 103, [2] H. Löhr, A.-R. Sadeghi, C. Stüble, M. Weber, and M. Winandy, Modeling trusted computing support in a protection profile for high assurance security kernels, in 2nd International Conference on Trusted Computing (TRUST 2009). LNCS 5471, Springer, 2009, pp [3] W. A. Arbaugh, D. J. Farber, and J. M. Smith, A secure and reliable bootstrap architecture, in IEEE Symposium on Security and Privacy. IEEE, 1997, pp [4] K. Shimizu, The Cell Broadband Engine processor security architecture, pa-cellsecurity/, Apr [5] Open Mobile Terminal Platform Consortium, OMTP advanced trusted environment: OMTP TR1 (v1.1), 2009, recommendation document, available at [6] D. Schütz, Boot loader, in Proceedings of the 11th European Conference on Pattern Languages of Programs (EuroPLoP 2006), [7] M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering. J. Wiley & Sons, [8] S. Gürgens, C. Rudolph, A. Maña, and A. Muñoz, Facilitating the use of TPM technologies through S&D patterns, in 18th Intl. Workshop on Database and Expert Systems Applications (DEXA 07). IEEE, 2007, pp
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
Digital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Hardware Security for Device Authentication in the Smart Grid
Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin Department of Computer Science, University of Oxford, UK {andrew.paverd,andrew.martin}@cs.ox.ac.uk Abstract.
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Embedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS?
HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS? Tobias Murmann, Heiko Rossnagel Chair of Mobile Commerce and Multilateral Security Johann Wolfgang Goethe-University Frankfurt D-60054 Frankfurt / Main,
Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone
CS 155 Spring 2006 Background TCG: Trusted Computing Group Dan Boneh TCG consortium. Founded in 1999 as TCPA. Main players (promotors): (>200 members) AMD, HP, IBM, Infineon, Intel, Lenovo, Microsoft,
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Using the TPM: Data Protection and Storage
Using the TPM: Data Protection and Storage Ariel Segall [email protected] Day 2 Approved for Public Release: 12-2749. Distribution unlimited License All materials are licensed under a Creative Commons
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Securing the E-Health Cloud
Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords
Data At Rest Protection
Data At Rest Protection Dell Data Protection Encryption Full Volume Encryption Whitepaper October 2011 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Certifying Program Execution with Secure Processors
Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects
Security concept for gateway integrity protection within German smart grids
Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken DECOIT GmbH, Fahrenheitstr. 9, D-28359 Bremen Email: [email protected] Carl-Heinz Genzel, Olav Hoffmann,
Security Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Security concept for gateway integrity protection within German smart grids
ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
vtpm: Virtualizing the Trusted Platform Module
vtpm: Virtualizing the Trusted Platform Module Stefan Berger Ramón Cáceres Kenneth A. Goldman Ronald Perez Reiner Sailer Leendert van Doorn {stefanb, caceres, kgoldman, ronpz, sailer, leendert}@us.ibm.com
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Embedded Security for Modern Building Automation Systems
Embedded Security for Modern Building Automation Systems Daniel Höttges, ESCRYPT GmbH Embedded Security, Bochum, Germany Marko Wolf, ESCRYPT GmbH Embedded Security, München, Germany Digitalization and
Supply Chain (In-) Security
Supply Chain (In-) Security Graeme Neilson & Enno Rey Contact us: [email protected], [email protected] Graeme & Enno Graeme Neilson Security Consultant & Researcher Networking, Reverse engineering,
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Trusted Virtual Machine Management for Virtualization in Critical Environments
Trusted Virtual Machine Management for Virtualization in Critical Environments Khan Ferdous Wahid Fraunhofer SIT Rheinstraße 75 64295 Darmstadt Germany www.sit.fraunhofer.de [email protected]
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Software-based TPM Emulator for Linux
Software-based TPM Emulator for Linux Semester Thesis Mario Strasser Department of Computer Science Swiss Federal Institute of Technology Zurich Summer Semester 2004 Mario Strasser: Software-based TPM
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
On the security of Virtual Machine migration and related topics
Master thesis On the security of Virtual Machine migration and related topics Ramya Jayaram Masti Submitted in fulfillment of the requirements of Master of Science in Computer Science Department of Computer
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Post-Class Quiz: Software Development Security Domain
1. A step-by-step implementation instruction is called A. Policy B. Standard C. Procedure D. Guideline 2. An approved configuration of software packages that describes how and what components are assembled
Mobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan Kari Kostiainen 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest in smartphone security 2 NA,
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
SECURITY IN OPEN SOURCE VIRTUALIZATION
SECURITY IN OPEN SOURCE VIRTUALIZATION S.SELVAKUMAR B.Tech., IFET College of Engineering, - [email protected] ABSTRACT: As virtual machines become increasingly commonplace as a method of separating
Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot
presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Securing Network Input via a Trusted Input Proxy
Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash University of Michigan {kborders, aprakash}@umich.edu Abstract The increasing popularity of online transactions involving sensitive
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Establishing and Sustaining System Integrity via Root of Trust Installation
Establishing and Sustaining System Integrity via Root of Trust Installation Luke St.Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel Systems and Internet Infrastructure Security Laboratory The Pennsylvania
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
