Using the TPM to Solve Today s Most Urgent Cybersecurity Problems
|
|
|
- Mariah Powell
- 10 years ago
- Views:
Transcription
1 Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, :00AM PDT
2 2
3 Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development) for Cisco and a member of the Trusted Computing Group's Embedded Systems Work Group. He also serves as the primary board member representing Cisco. Stacy has worked in the field of trusted computing for a number of years. As a subject matter expert in trusted computing, his responsibilities require an in-depth understanding of the trusted computing market, including advances in hardware and software security as well as vendor and customer market dynamics. Monty Wiseman, Security Architect, Intel Corporation Monty is a Security Architect for Intel's Data Center Group (DCG). His current projects include architecture for TCG, Intel's TXT(R) Technologies, Boot Guard(R) and other security initiatives. Monty has participated (for chair of) the TCG PC Client working group, Security Evaluation working group and is Intel's representative in the TCG Technical Committee. Monty has 20 years experience in Desktop, Network and Mainframe environments holding security related and other engineering positions at Novell, Fujitsu, and Control Data. Monty has been developing hardware and software for computers ranging from mainframe to microcomputers since
4 4
5 and Core Root of Trust for Measurement (CRTM) measure BIOS at boot Measurements are internally verified If a mismatch is found, the offending module is rolled back to the Last Known Good Then boot continues 1. Power on 2. CRTM measures BIOS 3. Measurements match expectations 4. Execute BIOS and boot 3. Mismatch found 3.5 Rollback bad module to last known good copy 5
6 UEFI Boot 1 Win 8 OS Loader Windows Kernel 2 Boot Policy AM Policy ELAM Software 3rd Party Software Secure boot prevents running an unknown OS loader ELAM starts first and enforces its policy Boot measurements were recorded during boot Signed boot measurements can be sent to an off-box service for analysis Slide duplicated from Microsoft //build presentation September 2011 Windows Logon Anti- Malware Client Quote Healthy? Attestation Service
7 Receiver for XC Network Isolation VPN Isolation VPN Isolation VPN Isolation AFRL s SecureView 1.2 Architecture XenClient XenClient XT Unique Control Domain Service VMs TS VM S VM Confid ential VM ESPN The integrity of blue components is validated Intel HW and the SELinux SELinux SELinux SE Linux SE Linux SE Linux Policy Granularity Xen Client XT Xen Security Modules Policy Granularity Policy Granularity Policy Granularity Intel vpro Hardware VT-d VT-x TXT AES-NI Mouse/ Keyboard Intel TXT/ nvidia GPU Intel Integrated GPU UNCLASSIFIED Cisco and/or its affiliates. All rights reserved. 7
8 Applying the SecureView Model to Cloud Servers SecureView uses Intel TXT and the to validate BIOS and the Hypervisor at start You always know you started a trusted Hypervisor and all of its services If one of those services continuously validates runtime integrity, you know the hypervisor remains trusted If VMs are also integrity checked at start, then the VM is also trusted Same deal if one of the services in a VM validates runtime integrity, you know the VM remains trusted Defense against zero-day attack: Integrity validation is focused only on detecting ANY uncontrolled change not any specific change 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 VM VM VM Integrity of VM measured at start and runtime integrity validated as for hypervisor Hypervisor Intel HW with TXT and Runtime integrity validated by Trapezoid or the like TXT and validate integrity of Hypervisor
10 VM VM VM Runtime integrity validation monitors uncontrolled changes to processes in execution any change is seen, therefore we have (limited) Zero-Day defense Hypervisor Intel HW with TXT and Continuous integrity validation gives no insight into the nature of the change. Operationally, that is generally unimportant. The rapid discovery that uncontrolled change occurred, IS important. The HW is mostly out of the loop during
11 GPU includes a Central ICS console Unknown operator Design: Authentication protocol enhanced to require Certificate exchange Integrity report exchange At session start, each side Signs a nonce and their integrity report using a HW protected key Validates the provided report No match, no session No session, no hack No key and no valid integrity report 11
12 12
13 BIOS resides in privileged space: Invisible to Anti-Virus SW Malware in BIOS is persistent : Does not go away by rebooting or reinstalling the OS CIH/Chernobyl 1998 killed between 1M and 2M machines Increase in security research John Heasman Rootkit in BIOS via ACPI Hijacked ACPI to inject Rootkit into system BIOS Sherry Sparks SMM rootkit with covert packet exfiltration 2008 Undetectable Key Logger Alfredo Ortega/Anibal Sacco persistent BIOS attack 2009 flash malicious BIOS onto system NIST SP Butterworth/Kallenberg/Herzog/Kovah Problems with the Static Root of Trust for Measurement byte patch to SCRTM to subvert measurements Bulygin/Furtak/Bazhaniuk 2013 A Tale of One Software Bypass of Windows 8 Secure Boot BIOS Flashing Trojan in the wild Trojan.Mebromi Sept 2011 Research is a leading indicator of future exploits. Secure boot bypass provides motivation.
14 14
15 Outside World s view of the Component. FW Component Mutable Components e.g., Firmware, software, configuration settings HW Component Immutable Components i.e., hardware 15
16 Version? Version? Version? V_1 V_2 V_2 FW/SW Component V1 FW/SW Component V2 FW/SW Component V1 (Attacked) HW Component HW Component HW Component 16
17 Outside World s view of a Trusted Component. FW Component Mutable Components e.g., Firmware, software, configuration settings Root HW Component Immutable Components i.e., hardware 17
18 Glossary: A component that performs one or more security-specific functions, such as measurement, storage, reporting, verification, and/or update. It is trusted always to behave in the expected manner, because its misbehavior cannot be detected under normal operation. Explanation: Must begin by trusting a set of components to perform necessary functions to support Trusted Computing in the expected manner. Misbehavior of these components is not detectable by the evidence and protocols provided by Trusted Computing. For example: A root fails to properly initialize a platform and measurements begin incorrectly. While this misbehavior might be detectable by physical inspection (e.g., in a lab) this misbehavior cannot be detected using Trusted Computing methods (i.e., attestation).
19 Shielded Locations location on a that contains data that is shielded from access by any entity other than the and which may be operated on only by a Protected Capability Defined Interface Protected Capabilities operation performed by the on data in a Shielded Location in response to a command sent to the Protected Capabilities Commands object Shielded Locations Instantiating Environment 19
20 Verified Boot: Boot policies are enforced during the boot process. Starting with the Root of Trust for Verification the currently executing module verifies the next module against a policy (i.e., manifest). Measured Boot: Integrity Measurement are placed into the. Starting with the Root of Trust for Measurement the currently executing module places the Integrity Measurement of the next module into the. Secure Boot: A boot process which implements either Verified Boot or Measured Boot or both.. Clarification: Verified Boot is often referred to as Secure Boot. Measured Boot is often referred to as Trusted Boot. Verified Boot (i.e., Secure Boot), however, only provides assurance that the boot policy was enforced and does not provide any assurance or evidence that the components are secure. Therefore, the moniker secure in this context is misleading.
21 Unsecured Boot Reset Assumption Execute Assumption Execute Assumption OS/ Apps Measured Boot Reset Verifies against Manifest during / after boot. Local Attestation: Enforces Policy Remote Attestation: Key signs measurements. IT Verifies against manifest Execute Measure Execute Measure OS/ Apps Verified Boot Reset Policy applied starting here IT Has no proof of Execute Verify Execute Verify OS/ Apps proper boot 21
22 Proof of a Device s Identity Proof (e.g., Authentication) of a platform s identity adds a cryptographic binding between the platform and a key Proof of a Device s [boot-time] Integrity Proof of the identity of the platform s firmware, software components and configuration Reset Boot Firmware Optional Components OS
23 Integrity Measurement Measurement At Reset PCR := 0 PCR := hash{ [PCR] Integrity Metric } Recorded metrics of the platform s characteristics Typically done using a series of cryptographic recordings At Reset PCR[X]:=0 then Boot Firmware Optional Components OS PCR[X] = hash{pcr[x] Integrity Metric of component 1} then PCR[X] = hash{pcr[x] Integrity Metric of next component}, etc. Roots Elements which must be trusted Misbehavior is not detectable Objective: Keep these small 23
24 24
25 A cohesive set of measurement started by RTM Provides an audit of boot sequence BIOS Option ROM OS Loader Measurement 25
26 Maps the BIOS components to PCRs E.g., PC Client Specification for UEFI BIOS Option ROM OS Loader PCR[0] PCR[2] PCR[4] 26
27 j j Commands Commands T P M o b e c t Other Functions Commands T P M o b e c t Other Functions object IP block IP block Discrete IP block (a chip) Integrated IP block Separate HW Domain 27
28 object Commands Apps OS Apps OS VM VM VM VMM Separate Virtual Domains 28
29 Applications TSS TDDL Byte Stream TSS RTM (e.g., ROM, BIOS Boot Block) (e.g., discrete chip, integrated IP Block) Boot FW (e.g., BIOS) Platform OS Driver PTP Defined Interface PTP Defined Internal Resources Device Driver Writers Guide Platform Profile (e.g., PC Client PTP, aka: TIS) Platform Specific Firmware Specifications (e.g., PC Client Firmware Specification for UEFI) X.X Family Functions Byte Stream 2.0 Library 29
30 Applications General Interfaces and code TSS Feature / Environmental API Linux Keyring Java classes: cypto / keyring PKCS#11 OS or Application Specific Key Managers TSS Expert-level Interfaces and code TDDL Driver PTP Defined Interface PTP Defined Internal Resources X.X Family Functions 30
31 31
32 Usage Description Problem Solution Device Attestation (Remote Attestation) IT wants data is sent only to authorized device. Assume user only executes authorized FW and OS. Prevent sending data to unauthorized devices. Need to determine the authenticity of an endpoint s claimed identity when: Device is outside IT s physical control Connected via untrusted connection Protect key authenticating device using a key Use a signing key with Properties: Non-duplicateable HMAC authorization Assume FW and OS installed by user will protect assets at runtime Device & Software Attestation (Remote Attestation) IT wants data is sent only to authorized device. Do not assume user only executes authorized FW and OS. Enforce authorized FW and OS was executed before sending data. Above + Enforce device executing authorized firmware / OS. Use a signing key with Properties: Above + PCR Policy Enforce FW and OS installed by user to protect assets at runtime Device Asset Protection (Local Attestation) Device lost or stolen. Attacker can mount and read device s media. Assume device executes only authorized FW and OS which provides runtime asset protection. Protect data from access when in the physical possession of attacker. Protect data with key but attacker can break user s low entry PIN protecting key using offline methods. Users will not use high-entropy PINs. Protect device encryption key using a key Use a signing key with Properties: Duplicateable (For recovery) HMAC authorization s anti-dictionary attack mechanisms allow low-entropy, user-friendly(er) PINs Assume device executes only authorized FW and OS which provides runtime protection of key. Note: Above protections come into play when attacker attempts to reboot device. Runtime protections are provided by OS. Device & Software Asset Protection (Local Attestation) Device lost or stolen. Attacker can mount and read device s media. Enforce device executes only authorized FW and OS which provides runtime asset protection. Above + Enforce device executes only authorized FW and OS which provides runtime asset protection. Protect device encryption key using a key Use a signing key with Properties: Above + PCR Policy Note: As above, but now PCR Policy enforces FW and OS. 32
33 Device Manufacturer Retail Store e.g., per NIST IT gets /Platform Certificates IT gets list of reference PCR values for authorized FW / OS IT Ship Device Sell Device Employee Employee sends device attestation Key{ PCR[] } Employee gets list of IT authorized devices IT requests signed PCR values IT verifies device is from authorized Manufacturer generate media encryption key w/pcr values above IT verifies PCR values against manifest provided by Manufacturer CertifyingKey{ Enc Key properties } IT verifies encryption key meets policies. Now sends data to device
34 34
35 An open, defined set of building block protocols providing platform-level attestation and storage protections Discussed previously Flexible set of Policies Policies are applied to objects when they are created Many policies types supported Can combine with AND and OR operations Algorithm Agility Protocols provide selectable (at implementation or use time) algorithms Symmetric keys (DEC, AES, etc.) Asymmetric keys (RSA, ECC, etc.) Hash algorithms (SHA-1, SHA-256, SHA-384, etc.) Enhanced Provisioning Separation of assets for the platform and user 35
36 Examples Password: Simple and in the clear used for trusted environments HMAC: A shared key using HMAC to protect secret in transit PCR: Platform must match expected configuration (measured firmware and software) Time: Can restrict a key to be used only for a certain period of time Count: Can restrict a key to be used only one time (or a set number) Signed: Verifies a signature from an external private key (e.g., SmartCard) ANDs and ORs This allows stronger two factor authorization (i.e., authorization is: Using the authorized device () AND have possession of the SmartCard + PIN. Can create a policy such as: (PCR) AND (Secret) : Normal user access protected data. Only authorized if authorized software and user are present OR (Signed) : An IT admin uses a SmartCard (even remotely) in case user forgets Secret 36
37 2 s library structures are not hard-coded to a particular algorithm may support more than one Protocols provide fields for selecting algorithms for each function vendor implement selected algorithms Platform Profile specifies minimum sets of algorithms Structure type Algorithm Type Crypto Data vendor may implement more than minimum set Supports types such as Symmetric keys (DEC, AES, etc.) Asymmetric keys (RSA, ECC, etc.) Hash algorithms (SHA-1, SHA-256, SHA-384, etc.) Extensible TCG Registry published identifying each TCG enumerated algorithm 37
38 Platform Hierarchy Storage Hierarchy Endorsement Hierarchy Platform Assets User Assets for signing and storage User Assets for Attestation Independent Controls for each hierarchy 38
39 Post your question now. 39
40 2.0 Library Specification: Infographic - Protect Your Data and Enhance Security: e_security SANS Institute: Implementing Hardware Roots of Trust White Paper & Webcast: of_trust Root of Trust: Foundation for IT Security Article: security Become a TCG Member Join Now!: 40
Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)
Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft)
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
Acronym Term Description
This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. Acronym Term Description
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB
SecureView & XenClient XT Security Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB AFMC PA Case Number: AFMC-2011-0166 The material was assigned a clearance of CLEARED on 01 Sep
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
vtpm: Virtualizing the Trusted Platform Module
vtpm: Virtualizing the Trusted Platform Module Stefan Berger Ramón Cáceres Kenneth A. Goldman Ronald Perez Reiner Sailer Leendert van Doorn {stefanb, caceres, kgoldman, ronpz, sailer, leendert}@us.ibm.com
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure
Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture
Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot
presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
On the security of Virtual Machine migration and related topics
Master thesis On the security of Virtual Machine migration and related topics Ramya Jayaram Masti Submitted in fulfillment of the requirements of Master of Science in Computer Science Department of Computer
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Hierarchies. Three Persistent Hierarchies. Chapter 9
Chapter 9 Hierarchies A hierarchy is a collection of entities that are related and managed as a group. Those entities include permanent objects (the hierarchy handles), primary objects at the root of a
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Software-based TPM Emulator for Linux
Software-based TPM Emulator for Linux Semester Thesis Mario Strasser Department of Computer Science Swiss Federal Institute of Technology Zurich Summer Semester 2004 Mario Strasser: Software-based TPM
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
SkySecure System Overview
SKYSECURE SYSTEM COMPONENTS SKYSECURE SERVER Trusted compute platform based on locked-down firmware, signed immutable images, Intel Trusted Execution Technology and the SkySecure I/O Controller. Controller
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager
Hardware + Software Solutions for The Best in Client Management & Security Malcolm Hay Intel Manager vpro - Hardware Management & Security for the New Era of End User Computing Hardware Management Intel
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
Hardware Enabled Zero Day Protection
Hardware Enabled Zero Day Protection Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Paul A. Rivera President/CEO Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone
CS 155 Spring 2006 Background TCG: Trusted Computing Group Dan Boneh TCG consortium. Founded in 1999 as TCPA. Main players (promotors): (>200 members) AMD, HP, IBM, Infineon, Intel, Lenovo, Microsoft,
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
The Impact of Cryptography on Platform Security
The Impact of Cryptography on Platform Security Ernie Brickell Intel Corporation 2/28/2012 1 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Data Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications
White Paper SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications SecureView provides accredited cross-domain
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Mobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan Kari Kostiainen 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest in smartphone security 2 NA,
