ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY



Similar documents
3 August Software Safety and Security Best Practices A Case Study From Aerospace

Flight Processor Virtualization

ARINC 653. An Avionics Standard for Safe, Partitioned Systems

Security in SCADA solutions

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011

MiCART : Mixed Criticality Real-time Hypervisor

EECatalog SPECIAL FEATURE

Frontiers in Cyber Security: Beyond the OS

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

The MILS Component Integration Approach To Secure Information Sharing

COS 318: Operating Systems. Virtual Machine Monitors

Security Security by Separation

Introduction to the NI Real-Time Hypervisor

Virtualization for Cloud Computing

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications

Full and Para Virtualization

Virtualization Technology

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Cloud Computing with Red Hat Solutions. Sivaram Shunmugam Red Hat Asia Pacific Pte Ltd.

Rapid Modular Software Integration (RMSI)

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

The Comprehensive and Fully Compliant Certification Solution. Certification Services

Connecting your Coffee-Shop Laptop to a Life-critical System

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG

VtRES Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC. ESRG Embedded Systems Research Group

SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS. By Alex Wilson, Director of Business Development, Aerospace and Defense

CSE 501 Monday, September 09, 2013 Kevin Cleary

Safety and Airworthiness Cases for Unmanned System Control Segments. George Romanski, Joe Wlad S5 Symposium, Dayton, OH June 12-14, 2012

Enabling Technologies for Distributed Computing

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

Model Driven Development of Certifiable Software: A Best Practice for Safety-Critical Applications

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia

IOS110. Virtualization 5/27/2014 1

IoT Security Platform

<Insert Picture Here> Introducing Oracle VM: Oracle s Virtualization Product Strategy

Virtual Machine Security

kvm: Kernel-based Virtual Machine for Linux

OVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST

Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time

Enabling Technologies for Distributed and Cloud Computing

Technical Brief Distributed Trusted Computing

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Date: December 2009 Version: 1.0. How Does Xen Work?

Computing Service Provision in P2P Clouds

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

Beyond the Hypervisor

Parallels Server 4 Bare Metal

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Software in safety critical systems

Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

WIND RIVER SECURE ANDROID CAPABILITY

Security Considerations in Cloud Deployments Matthew Garrett

ARM TrustZone and KVM Coexistence with RTOS For Automotive

ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS

How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or

Real-time Operating Systems. VO Embedded Systems Engineering Armin Wasicek

High Performance or Cycle Accuracy?

Servervirualisierung mit Citrix XenServer

Virtualization. Explain how today s virtualization movement is actually a reinvention

Intro to Virtualization

A New Approach to Nuclear Computer Security

Building Resilient Systems: The Secure Software Development Lifecycle

Attacking Hypervisors via Firmware and Hardware

The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor

Multi-core Programming System Overview

Virtualization. Pradipta De

Development of Type-2 Hypervisor for MIPS64 Based Systems

Chapter 1: Introduction

Industry Challenges in Embedded Software Development

The evolving ARINC 653 standard and it s application to IMA

Optimize Server Virtualization with QLogic s 10GbE Secure SR-IOV

Cisco Prime Home 5.0 Minimum System Requirements (Standalone and High Availability)

The Xen of Virtualization

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Transcription:

ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY Dr. Gregg Wildes DornerWorks www.dornerworks.com Embedded Systems Engineering for Security and Safety-Critical Systems Where Hardware and Software Meet

Overview & Context Embedded Electronics Engineering Motivation for Trusted/Untrusted Software Security and Safety Hypervisor 2

Motivation Connected World We Live in a Material World We Live in a Connected World 3

Motivation IoT Things We Live in a Connected World DornerWorks focuses on the Things in IoT. Embedded devices are increasingly inter-connected. 4

Is a Vehicle IoT? Vehicle Vulnerabilities 5

Security or Safety? DARPA Automotive Security Project, This fact, that a car is not a simple machine of glass and steel but a hackable network of computers. Charlie Miller (left) and Chris Valasek behind their Prius dismantled dashboard. 6

Safety or Security? The vulnerabilities that we found were the kind that existed on PCs in the early to mid-1990s, when computers were first getting on the Internet, Professor Stefan Savage, UCSD. 7

Motivation Federated vs. Integrated Historically, aircraft had many independent systems running specific applications flight management, navigation, controls... 8

Motivation Federated vs. Integrated With modern computing, previously independent systems are now integrated into a few computing platforms. Reduced SWaP (Size, Weight and Power) 9

Motivation Federated vs. Integrated As microprocessors become more powerful, previously independent systems are now integrated on to one computing platform. Isolated vs. Connected In the past, embedded devices were generally isolated from broader networks. Today, embedded devices are increasingly inter-connected. 10

Safety or Security? 11

Problem Need a Secure AND Safe embedded platform solution, without compromising Performance Security concerns in safety-critical systems are now paramount; and Aerospace & Defense, Medical, and Automotive markets are all demanding solutions. our open-source, open-architecture hypervisor provides safety, security, and performance on an embedded platform. 12

Hypervisors & Virtualization What is virtualization? 10/28/2015 DornerWorks Proprietary - do not disclose

Architecture 14

Simultaneous Benefits Security Multiple Independent Levels of Security (MILS) Common Criteria (CC) Evaluation Assurance Level (EAL) up to 7 Add security features Safety Trusted Platform Modules (TPM) Secure kernel objects Firmware module signing and verification Certification artifacts and models DO-178C Certification with Design Assurance Level A, ARINC 653 Partitioning IEC 61508 Sufficient Independence Performance New performance features: Multicore processors, Interrupt I/O 15

Evolution - DornerWorks IR&D DornerWorks evaluated hypervisor options: Open source vs. proprietary hypervisor solutions DornerWorks enabled security and safety certification of systems. Some say secure or safe, we set out to prove it. 16

Evolution - Navy SBIR Isolation Techniques for Untrusted Software Evaluated security and performance for the ARINC 653 CPU scheduler Established the feasibility of formal modeling for security Mock certification reviews for safety conducted by FAA DER consultant using Stage Of Involvement (SOI) audits White hat hacker testing 17

Evolution - DARPA SBIR Space Hypervisor Development of payload hypervisor mission event scheduler. Conducted on-sight DARPA demonstration in February 2015, Program manager extremely impressed with maturity of product at this stage of the development High altitude balloon flights planned 18

TARDEC: Hypervisor Evaluation Cross Domain Solutions with Xen hypervisor Performing trade study on hypervisors Results will define embedded Xen future development: Cross Domain Solutions (CDS) for Secure communications Real time performance optimization for embedded military vehicles Supports multiple guest OS: Linux, Android, Windows, and others 19

Xen Hypervisor Cross Domain Solution Multiple levels of security on single integrated hardware platform 20

Evolution Xilinx Collaboration Business critical support for Xen hypervisor Like Red Hat for Linux www.xen.world Related technical expertise: Xilinx Premier Design Partner - FPGA Embedded Electronics Software & Hardware design 21

Security vs. Safety Analysis Safety Properties System does good things Shall Requirements Can be Tested Well suited for DO-178B PolicyStatement Current Schedule TaskList Security Properties Doesn t do bad things Shall Not Requirements Very difficult to test Well suited for Formal Analysis FreeBufferList Mathematically rigorous verification techniques Task[1] Task[2] Configuration Kernel Heap Hypervisor Security Evaluation Driven by Common Criteria / MILS/ SKPP High-Robustness Requirements Judicious use of scalable formal analysis techniques (Rockwell s DFL) Designed to minimize life-cycle cost Focused on high-value security concerns 22

Safety and Security Certification DO-178C, Level A Safety EAL 5* Security EAL = Evaluation Assurance Level EAL 6+ requires Formal Methods Analysis Does not flow in the other direction * Merging Safety and Assurance: The Process of Dual Certification for Software, Carol Taylor, Jim Alves-Foss, and Bob Rinker, University of Idaho Center for Secure and Dependable Systems. 23

Safety Design Assurance Levels Level A is the most critical failure level and a software failure here would result in a catastrophic failure condition for an aircraft. Level B would cause or contribute to hazardous/severe major failure condition for an aircraft. Level C would cause or contribute to major failure condition for an aircraft. Level D would cause or contribute to minor failure condition for an aircraft. Level E would have no effect on an aircraft. 24

Security Design Assurance Levels EAL7: Formally Verified Design and Tested EAL6: Semi-formally Verified Design and Tested EAL5: Semi-formally Designed and Tested EAL4: Methodically Designed, Tested, and Reviewed EAL3: Methodically Tested and Checked EAL2: Structurally Tested EAL1: Functionally Tested 25

Architecture 26

Hypervisor Demo 27

Summary & Take-aways Embedded IoT = Things Motivation Connected Devices Creates Vulnerabilities Security and Safety Hypervisor Separation to Manage/Optimize www.xen.world 28

Questions? Thank you! Dr. Gregg Wildes DornerWorks www.dornerworks.com www.xen.world Embedded Systems Engineering for Security and Safety-Critical Systems 29