Technologies to Improve. Ernie Brickell



Similar documents
The Impact of Cryptography on Platform Security

Haswell Cryptographic Performance

AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition

Secure Network Communications FIPS Non Proprietary Security Policy

Security Policy for FIPS Validation

M-Shield mobile security technology

Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

Improving OpenSSL* Performance

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Windows Server Virtualization & The Windows Hypervisor

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

SkyRecon Cryptographic Module (SCM)

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Pulse Secure, LLC. January 9, 2015

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

Intel Identity Protection Technology (IPT)

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

USB Portable Storage Device: Security Problem Definition Summary

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Performance of Software Switching

SecureDoc Disk Encryption Cryptographic Engine

USB Portable Storage Device: Security Problem Definition Summary

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Software Token Security & Provisioning: Innovation Galore!

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Intel Xeon Processor E5-2600

A Hypervisor IPS based on Hardware assisted Virtualization Technology

Deeper Levels of Security with Intel Identity Protection Technology

Applying Cryptography as a Service to Mobile Applications

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Security in the Cloud

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Intel Virtualization Technology Overview Yu Ke

Breakthrough AES Performance with. Intel AES New Instructions

Embedded Java & Secure Element for high security in IoT systems

Intel Trusted Platforms Overview

UNCLASSIFIED Version 1.0 May 2012

ClearPath MCP Software Series Compatibility Guide

CLOUD SECURITY: Secure Your Infrastructure

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

UM0586 User manual. STM32 Cryptographic Library. Introduction

Using BroadSAFE TM Technology 07/18/05

Frontiers in Cyber Security: Beyond the OS

BroadSAFE Enhanced IP Phone Networks

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Enterprise-Ready Security for Business Clients with Intel Processors

Intel Core i Processor (3M Cache, 3.30 GHz)

Using Intel AES New Instructions and PCLMULQDQ to Significantly Improve IPSec Performance on Linux*

SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS Security Policy

FIPS Security Policy LogRhythm Log Manager

SENSE Security overview 2014

Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 th_decoder@126.com

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Secure Data Exchange Solution

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Transport Layer Security Protocols

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

A Perspective on the Evolution of Mobile Platform Security Architectures

Disk encryption... (not only) in Linux. Milan Brož

9/26/2011. What is Virtualization? What are the different types of virtualization.

Mobile Platform Security Architectures A perspective on their evolution

Intel Virtualization Technology (VT) in Converged Application Platforms

Analyzing the Security Schemes of Various Cloud Storage Services

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

Full and Para Virtualization

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

Penetration Testing Windows Vista TM BitLocker TM

Using AES 256 bit Encryption

The Encryption Technology of Automatic Teller Machine Networks

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Security Policy. Trapeze Networks

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

Intel Xeon Processor E Product Family

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Transcription:

Technologies to Improve Platform Security Ernie Brickell Intel Corporation 9/29/2011 1

Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient efficient performance silicon, connectivity, and security. Paul Otellini Intel CEO There s an urgent need for security innovation as people are spending more time online and the amount of data is growing. 2 Intel Architecture Group

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 3 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 4 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching

Digital Random Number Generator (DRNG) Entropy Source BIST Online Health Tests Test Port DRNG Combined Conditioner/ Deterministic Random Bit Generator (DRBG) DRNG Wrapper Interface (embedding specific) A reusable circuit that provides an autonomous/self contained, complete DRNG Provides a hardware source of high quality, high performance entropy to be embedded across Intel products. It is composed of An all-digital Entropy Source, (3 Gbps, 90% Entropic) Runtime Entropy Source health measurement via Online Health Test, Conditioning (via AES CBC-MAC mode) and DRBGing (via AES CTR mode) post processing and Built In Self Test (BIST) and Test Port Standards compliant (NIST SP 800-90) and FIPS 140-2/3 Level 2 certifiable as such 5

RDRAND Performance Preliminary data from pre-production p o Ivy Bridge sample 1 RdRand new CPU instruction which provides access to DRNG Up to 70 million RdRand invocations per second 500+ Million Bytes of random data per second Throughput ceiling is insensitive to number of contending parallel threads Steady state maintained at peak performance RdRand ds (Millions s/sec) Th hroughput (MB/sec) 80 70 60 50 40 30 20 10 0 600 500 400 300 200 100 0 Throughput (RdRands/s) 1 2 3 4 5 6 7 8 9 10 11 12 Number of Parallel Threads Throughput (MB/s) 1 2 3 4 5 6 7 8 9 10 11 12 Number of Paralel Threads 6 Intel Architecture Group 1 Data taken from Intel processor codename Ivy Bridge early engineering sample board. Quad core, 4 GB memory, hyper-threading enabled. Software: LINUX* Fedora 14, gcc version 4.6.0 (experimental) with RdRand support, test uses pthreads kernel API.

RdRand Response Time and Reseeding Frequency Preliminary data from pre-production Ivy Bridge sample 1 RdRand Response Time ~150 clocks per invocation Little contention until 8 threads (or 4 threads on 2 core chip) Simple linear increase as additional threads are added DRNG Reseed Frequency Single thread worst case: Reseeds every 4 RdRand invocations Multiple thread worst case: Reseeds every 23 RdRand d invocations At slower invocation rate, can expect reseed before every 2 RdRand calls NIST SP 800-90 recommends 2 48 ) ck cycles) Time (Clo Response DRNG 128- -bit Outpu uts 300 250 200 150 100 50 25 20 15 10 5 0 0 RdRand Response Time 1 2 3 4 5 6 7 8 9 10 11 12 Number of Parallel Threads DRNG Reseed Frequency 1 2 3 4 5 6 7 8 9 10 11 12 Number of Parallel Threads 1 Data taken from Intel processor codename Ivy Bridge early engineering sample board. Quad core, 4 GB memory, hyper-threading enabled. Software: LINUX* Fedora 14, gcc version 4.6.0 (experimental) with RdRand support, test uses pthreads kernel API. 7 Intel Architecture Group

Software Side Channels Not Hardware Side Channel where adversary has physical access. Not Software Covert Channel where adversary has malware in a high security partition and a low security partition Software Side Channel Adversary has malware executing in a spy process, and tries to obtain information about an uncompromised target process executing on same platform. Target App with Protected Asset OS Spy App Inside trust boundary Outside trust boundary 8 Intel Architecture Group

Protection ti from software side channels Platform approach for software side channels AES-NI: CPU instructions for a round of AES PCLMULQDQ: CPU instructions for GF(2) Multiplication Recommend side channel mitigated implementations of other crypto algorithms No secret key or data dependent memory access (at coarser than cache line granularity) code branching Ex: RSA implemented with <6% performance reduction in OpenSSL 9 Intel Architecture Group

Crypto Performance Software improvements Multi-buffer Function Stitching Hardware improvements AES-NI PCLMULQDQ Microarchitecture improvements 10 Intel Architecture Group

Multi Buffer Performance 1 WSM Core Multi-buffer: Perform the same function on multiple independent data buffers 9,000 8,000 7,000 AES: Total Cycles / Buffer Single Buffer 8,438 6,000 Multi Buffer 5,000 4,000 3,000 2,528 3X 2,841 2,000 1,000 0 1,333 972 582 158 137 48 Byte Distribution 0 Distribution 1 2048 Byte Excellent performance on AES CBC Encrypt 11 Intel Architecture Group *See Intel technical papers for full description of methodology and results.

Function Stitching Protocols such as SSL/TLS and IPsec apply two functions, confidentiality and integrity Improved performance by using multiple execution units more efficiently Fine grain integration achieves higher performance 1.4X Speedup on AES128 CBC-Encrypt with SHA1 (Cycles/Byte) Method to speedup combined Encrypt/Authenticate 12 Intel Architecture Group

Sandy Bridge Performance SNB 2 nd Generation Intel Core improves: AES-NI Throughput SIMD Processing via AVX ISA extensions Large-integer processing (public-key crypto) Multi Buffer Performance (Cycles/byte) Algorithm i5 650 i7 2600 i7 2600 Gain MD5 1.46 1.27 1.15 SHA1 2.96 2.2 1.35 SHA256 6.96 5.27 1.32 AES128 CBC Encrypt 1.52 0.83 1.83 Modular Exponentiation Performance (Cycles) Algorithm i5 650 i7 2600 i7 2600 Gain 512 bit Modular Exponentiation 360,880 246,899 1.46 1024 bit Modular Exponentiation 2,722,590 1,906,555 1.43 13 Intel Architecture 1.2-1.8X Group additional performance gain on SNB!

Summary of reduction in trust boundary by virtualization and measured launch Component in Trust Boundary OS with kernel additions Devices that can DMA Apps installed by user Virtualization layer underneath the OS BIOS, including SMM Option ROMS Mitigation with virtualization and measured launch Use VT-x and Require fewer kernel additions and device drivers in some VMs Restrict DMA to a single VM through VT-d Restrict apps in protected VM, and sandbox suspect code Allow only acceptable VMMs to launch using TXT launch control policy Remove some or all of the BIOS from trust boundary using TXT and/or STM capability Remove Option ROMS from trust boundary using TXT 14 Intel Architecture Group

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 15 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching

IPT 1.0: One Time Password (OTP) The first generation of Intel IPT is a dynamic code generated on 2nd generation Intel Core processor-based PCs that is protected from malware in the OS. Single use, (i.e. 30 second, time-limited code OTP ) A hardware level 2nd factor of authentication Works with leading OTP Solutions from Symantec & Vasco Traditional hardware token CPU OTP Client App / Browser Intel IPT Middleware ME Embedded OTP App Now embedded into your PC Intel ISV No system can provide absolute security under all conditions. Requires an Intel IPT enabled system, including a 2 nd generation Intel Core processor, enabled chipset, firmware and software. Available only on participating websites. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit 16 [http://ipt.intel.com]. Intel Architecture Group

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 17 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching

Supervisor Mode Execution Protection (SMEP) Operating System Supervisor Mode (Kernel Mode / Ring-0) User Mode Can perform any task on system Can perform limited tasks on system Prevents attacks when executing user-mode code in ring-0 Extends Intel execute Disable capability Available on Intel CPUs starting 2012 How does SMEP work? 0xF..FFF 1. Syste em call 0x0..000 Kernel Memory NULL pointer vulnerability App memory Attack code re Mode ges) ock or call malwar n Mode Sprvsr. privileg M P would 2. Jump blo o Supervisor on while in M SMEP executio (with S Example where SMEP benefits: Stuxnet worm SMEP would have prevented one method of attack by Stuxnet > Escalation of Privilege attack SMEP can prevent malware exploiting EoP vulnerabilities from executing 18 Intel Architecture Group

McAfee DeepSAFE Technology platform co-developed with Intel Not a product, the foundation for new solutions Hardware-assisted, security-focused, system monitor Sits below the OS to provide a new vantage point for security Solutions to be announced soon. Announcement from McAfee: http://www.mcafee.com/us/solutions/mcafee-deepsafe.aspx 19 Intel Architecture Group

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 20 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching

Recommend BIOS Hygiene NIST SP800-147 BIOS protection Guidelines Use digital signatures to verify the authenticity of BIOS updates. BIOS updates verified using a Root of Trust for Update which includes: The key store used to verify signatures on updates. The digital signature verification algorithm. Use of NIST-approved crypto algorithms. Recommend rollback protection. http://csrc.nist.gov/publications/nistpubs/800-147/nist- SP800-147-April2011.pdf pdf Minimize TCB for system boot 21 Intel Architecture Group

Intel Security & Trust Pillars Identity Protection & Fraud Deterrence Detection & Prevention of M l Malware Securing Data and Assets Recovery and Enhanced Patching Stay tuned for future improvements in all pillars 22 Intel Architecture Group

Feedback What else should Intel be doing? Are we on the right track? 23 Intel Architecture Group

Technical Papers - 1 Breakthrough AES performance with Intel AES New Instructions http://software.intel.com/file/26898 Processing Multiple buffers in parallel http://download.intel.com/design/intarch/papers/324101.pdf Fast Cryptographic computation on IA processors via Function Stitching http://download.intel.com/design/intarch/papers/323686.pdf Fast and Constant-time Implementation of Modular Exponentiation http://www.cse.buffalo.edu/srds2009/escs2009_submission_gopal.pd f Fast CRC Computation for iscsi Polynomial using CRC32 Instruction http://download.intel.com/design/intarch/papers/323405.pdf Optimized Galois-Counter-Mode Implementation on IA Processors http://download.intel.com/design/intarch/papers/324194.pdf High Performance Storage Encryption on Intel Architecture Processors http://download.intel.com/design/intarch/papers/324310.pdf 24 Intel Architecture Group

Technical Papers - 2 Fast CRC Computation for Generic Polynomials using PCLMULQDQ Instruction http://download.intel.com/design/intarch/papers/323102.pdf p// / / /p p / p High Performance DEFLATE Decompression on Intel Architecture Processors http://edc.intel.com/link.aspx?id=3972 Cryptographic Performance on the 2 nd Generation Intel Core Processor http://download.intel.com/design/intarch/papers/324952.pdf Fast Parallel CRC Computation using the Nehalem CRC32 instruction http://drdobbs.com/cpp/229401411 Using Intel AES New Instructions and PCLMULQDQ to Significantly Improve IPSec Performance on Linux http://download.intel.com/design/intarch/papers/324238.pdf IDF 2010 Presentation ti with Voice: Examining i the Performance of Intel AES New Instructions on Intel Core i7 Processor http://intelstudios.edgesuite.net/idf/2010/sf/aep/sfts012/sfts012. html 25 Intel Architecture Group