Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013



Similar documents
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Hi and welcome to the Microsoft Virtual Academy and

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Trustworthy Computing

Index. BIOS rootkit, 119 Broad network access, 107

Data At Rest Protection

Session ID: Session Classification:

Windows Phone 8 Security Overview

Using the TPM: Data Protection and Storage

Technical Brief Distributed Trusted Computing

Patterns for Secure Boot and Secure Storage in Computer Systems

Introduction to BitLocker FVE

Penetration Testing Windows Vista TM BitLocker TM

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

BYOD AND NEXT- GENERATION MOBILE SECURITY

Lecture Overview. INF3510 Information Security Spring Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure

Security Considerations in Cloud Deployments Matthew Garrett

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Cautions When Using BitLocker Drive Encryption on PRIMERGY

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Secure Storage. Lost Laptops

Embedded Trusted Computing on ARM-based systems

Windows Operating Systems. Basic Security

Microsoft MVP (Enterprise / Azure Security 9 Years) Microsoft Certified Trainer (20 years) Founder: Cybercrime Security Forum!

Dell Client BIOS: Signed Firmware Update

TPM Key Backup and Recovery. For Trusted Platforms

End User Devices Security Guidance: Apple OS X 10.10

Software Execution Protection in the Cloud

Security Policy for FIPS Validation

Computer Security. Draft Exam with Answers

DriveLock and Windows 7

Property Based TPM Virtualization

Background. TPMs in the real world. Components on TPM chip TPM 101. TCG: Trusted Computing Group. TCG: changes to PC or cell phone

Windows 7. Qing Liu Michael Stevens

Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker

Guidance End User Devices Security Guidance: Apple OS X 10.9

Navigating Endpoint Encryption Technologies

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Get Success in Passing Your Certification Exam at first attempt!

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Kaspersky Lab s Full Disk Encryption Technology

SimplySecure TM Architecture & Security

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Managing BitLocker Encryption

BitLocker Network Unlock & BitLocker support for Encrypted Drives

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

EndUser Protection. Peter Skondro. Sophos

Windows Phone 8 Security deep dive

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

TrustKey Tool User Manual

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Attestation and Authentication Protocols Using the TPM

Software Token Security & Provisioning: Innovation Galore!

Control your corner of the cloud.

A brief on Two-Factor Authentication

Enhancing Organizational Security Through the Use of Virtual Smart Cards

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Operating System Security

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

UEFI Implications for Windows Server

Security Technology for Smartphones

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Cisco Trust Anchor Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Firmware security features in HP Compaq business notebooks

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

12 Security Camera System Best Practices - Cyber Safe

An Improved Trusted Full Disk Encryption Model

Chapter 1 Scenario 1: Acme Corporation

CS 155 Spring TCG: Trusted Computing Architecture

A Security Survey of Strong Authentication Technologies

Secure Data Management in Trusted Computing

Encrypting stored data. Tuomas Aura T Information security technology

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

Section 12 MUST BE COMPLETED BY: 4/22

Encrypted File Systems. Don Porter CSE 506

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

DriveLock and Windows 8

Evolution Of Cyber Threats & Defense Approaches

SafeGuard Easy upgrade guide. Product version: 7

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

SafeGuard Enterprise Administrator help. Product version: 6.1


W ith an estimated 14 billion devices connected to

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

Transcription:

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013

Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile Devices Check out http://www.jwsecure.com/dan

What does the NSA think? The NSA has been public about: Inevitability of mobile computing Need to support cloud-based services Even for use with secret data in the field What works for them can work for you

How does the cloud know Who you are? Where you are? Is your computer acting on your behalf?

Device Integrity A device is silicon It might be pretending to be me It might be pretending to be you Define device integrity to be truth telling Is the device faithfully asserting delegation? Is it faithfully representing the user s intent?

Current Technology Landscape Why are mobile devices less secure? Inconvenience of good passwords Current antivirus is not up to the task User-owned (BYOD/consumerization trends) But mobile devices do have security features Screen lock Secure storage TrustZone & Trusted Execution Environment Trusted Platform Module

Mobile Vulnerabilities Rootkits got harder, bad apps got much easier Mobile threat landscape: Easy to steal the device Easy to steal services Easy to install apps that steal data Even remote eavesdropping

What is needed to be secure? Encrypt user data Sandbox apps Secure, measured boot (TPM) Remote platform attestation

How to use a hardware root of trust Device receives TPM-bound token Sends token to relying party to prove status Token can carry decryption key as well If device is measured to be insecure The good guys win! Need to reset machine to clean it

What is Remote Attestation? Remote attestation is enabled by the TPM Can a server know the truth about the client? Use root of trust to measure boot chain and configuration Remote attestation is a means to the truth The TPM attests to device attributes Rootkit-resistant, though not perfect

Remote Attestation Service (RAS) Needs secure data from manufacturer or telco Hashes of known good code Only early boot code is hashed by the TPM Still rely on traditional antivirus for user mode protection The data/content provider must trust the RAS

How does the RAS trust the Device? BIOS Hash of next item(s) Boot Loader Kernel TPM [PCR data] [AIK pub] [Signature] Boot Log Early Drivers

Is remote attestation really secure? Hardware root of trust within TPM (but might be firmware) PCRs are accumulated in secure location Send PCRs + boot log to RAS signed by TPM TPM 2.0 time counter Can be expressed as policy What advantage does that give us?

Time-based Authorization Secure local time reduces attack surface Devices now use authorization windows Limit token lifetime Otherwise, attacker can sleep the device, change the clock, continue to access data Great way to protect downloaded data

Mechanics of secure time See our whitepaper: Trusted Tamperproof Time on Mobile Devices http://www.jwsecure.com/dan Applicability to DLP and DRM

TimedKey.exe Tool Requires 32-bit Windows 8 with TPM 2.0 See http://www.jwsecure.com/dan CLI: C:\>TimedKey.exe TimedKey.exe - JW Secure Demo: Policy bound hardware keys CREATE : -c:[1024, 2048] -k:keyfile {-decrypt -sign -t:60 -p:pin} ENCRYPT : -e:cleartext -k:keyfile -o:cipherfile DECRYPT : -d:cipherfile -k:keyfile {-p:pin} SIGN : -s:data -k:keyfile -o:signfile {-p:pin} VERIFY : -v:data -k:keyfile -i:signfile

Policy-Enforced File Access BYOD Download sensitive files Leave device in taxi

The threat model

Known Threats TPM setup on legacy devices = fail TPM reset attacks Hardware attacked, e.g., Black Hat Given enough money it is always possible Attacking the supply chain

BitLocker Attacks Cold boot, Firewire, BIOS keyboard Keys in TPM can be used if PIN is weak Incorrectly configured local DLP E.g., Bitlocker can be set to Standby Same considerations for similar apps

What remains to be done? Database of known-good hashes Heuristics to determine provisional trust of new code What measurements to enforce, and when?

Thank you! Dan Griffin is the founder of JW Secure and is a Microsoft Enterprise Security MVP. Dan is the author of the books Cloud Security and Control and The Four Pillars of Endpoint Security and is a frequent conference speaker and blogger. Dan holds a Master s degree in Computer Science from the University of Washington and a Bachelor s degree in Computer Science from Indiana University.

Supporting Files Endpoint Security and Trusted Boot http://fedscoop.com/gen-alexander-cloudkey-to-network-security/ http://www.jwsecure.com/jw-secureinformer-15/ Hacking Measured Boot and UEFI at DefCon 20