Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1



Similar documents
The MIPS architecture and virtualization

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Sierraware Overview. Simply Secure

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Hardware Based Virtualization Technologies. Elsie Wahlig Platform Software Architect

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

A Scalable VISC Processor Platform for Modern Client and Cloud Workloads

Embedded Java & Secure Element for high security in IoT systems

Hardware accelerated Virtualization in the ARM Cortex Processors

Intel Virtualization Technology (VT) in Converged Application Platforms

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Full and Para Virtualization

NoHype: Virtualized Cloud Infrastructure without the Virtualization

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

PikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG , Moscow

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Virtualization. Michael Tsai 2015/06/08

Next Generation Operating Systems

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Virtual Machine Security

Virtualization. Pradipta De

Security Security by Separation

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Above the clouds: A Berkeley View of Cloud Computing

Multi-core Programming System Overview

Leveraging Thin Hypervisors for Security on Embedded Systems

WIND RIVER SECURE ANDROID CAPABILITY

Enabling Technologies for Distributed Computing

Virtual Hosting & Virtual Machines

Virtual Machines. COMP 3361: Operating Systems I Winter

ADM5120 HOME GATEWAY CONTROLLER. Product Notes

Virtual Machines. Virtualization

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation

Lecture 02b Cloud Computing II

Attacking Hypervisors via Firmware and Hardware

Windows Server Virtualization & The Windows Hypervisor

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization

Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi,

Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U

What Cloud computing means in real life

AppliedMicro Trusted Management Module

Technical Brief Distributed Trusted Computing

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

High Performance or Cycle Accuracy?

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller

Enabling Technologies for Distributed and Cloud Computing

Proposal for Virtual Private Server Provisioning

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

The Xen of Virtualization

ARM TrustZone and KVM Coexistence with RTOS For Automotive

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Commercially Proven Trusted Computing Solutions RSA 2010

Virtual Machine in Data Center Switches Huawei Virtual System

COS 318: Operating Systems. Virtual Machine Monitors

LinuxCon/CloudOpen 2015

Tim Tharratt, Technical Design Lead Neil Burton, Citrix Consultant

PrivyLink Cryptographic Key Server *

EECatalog SPECIAL FEATURE

ISOLATING UNTRUSTED SOFTWARE ON SECURE SYSTEMS HYPERVISOR CASE STUDY

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

Secure data processing: Blind Hypervision

Basics of Virtualisation

Compromise-as-a-Service

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Knut Omang Ifi/Oracle 19 Oct, 2015

High-performance VoIP Traffic Optimizer Client Solution

Reviving smart card analysis

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Parallels Virtuozzo Containers

Virtualization Technologies (ENCS 691K Chapter 3)

Intel Graphics Virtualization Technology Update. Zhi Wang,

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Chapter 14 Virtual Machines

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Beyond Virtualization: A Novel Software Architecture for Multi-Core SoCs. Jim Ready September 18, 2012

How To Create A Cloud Based System For Aaas (Networking)

The Review of Virtualization in an Isolated Computer Environment

Cloud Computing for SCADA

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Transcription:

Secure Containers Jan 2015 www.imgtec.com Imagination Technologies HGI Dec, 2014 p1

What are we protecting? Sensitive assets belonging to the user and the service provider Network Monitor unauthorized access, misuse, modification, or denial of a network-accessible resources Application Operating System Platform Original manufacturer; anti-cloning Application / OS Platform Authenticity Runtime Integrity Data Extranet Data Intranet Secret key, digital certificates Attack Surface Area control execution, view, copy, print, and altering Imagination Technologies HGI Dec, 2014 p2

Platform Security Open Everything, Smart Everything, Internet of Everything Problem Mobile Devices, Home Gateways, in vehicle infotainments, etc, increasing require security Solutions Trusted Execution Environment (TEE) Secure Element (SE) Trusted Platform Module (TPM) Implementation Closed proprietary by SoC manufacturer Two World (Secure and Normal) Secure Hypervisor Imagination Technologies HGI Dec, 2014 p3

Security Implementation Next generation platforms demand multiple secure data-flows User Space H/W + TPM Layered Two Worlds Normal World Secure World Platform Virtualization VM 0 TEE VM n Hypervisor Reduced Attack Surface Area Single Client Customized Security at a cost Inflexible Proprietary Security schemes Single Client Single TEE Secure Apps coexist in Secure World Restricted scalability in multi-core Multi-Client Multiple TEEs All Secure Apps in own VM Fully scalable in multi-core Imagination Technologies HGI Dec, 2014 p4

Scalable Security- Hardware Virtualization Secure Root is the secure hypervisor/kernel access-rights controlled by Root Scalable Supports many s (CPU & GPU pairs) SoC virtualization support Virtualized GIC (interrupt controller) and IOMMU Bus transactions to other IP include ID Benefits Ease of use - no modification required to OS Reliability corrupted/crashed OS1 cannot affect OS2 Performance intelligent resource allocation Heterogeneous GPU operation Secure/non-Secure OS/Apps App App App App OS1 OS2 App Hypervisor/Secure Kernel MIPS core H/W supported Virtualization s -ID Root TPM ------- Boot ROM Imagination Technologies HGI Dec, 2014 p5

True Isolation Benefits Secure Extranet TEE Secure Intranet Mature, proven technology used in networking and Compute H/W Firewall high level of security OpenWRT Secure App s Crypto 3 rd Party Containers Secure services can only affect their container Not the overall system Highest flexibility and performance Multiple Secure Domains IP protection provided through system partitioning Software Hardware Secure OS IPC Hypervisor MIPS, PowerVR Heterogeneous Platform Offloads Secure Boot DRAM WAN LAN Imagination Technologies HGI Dec, 2014 p6

True Isolation Benefits Secure Extranet TEE Secure Intranet Mature, proven technology used in networking and Compute H/W Firewall high level of security OpenWRT Secure App s Crypto 3 rd Party Containers Secure services can only affect their container Not the overall system Highest flexibility and performance Multiple Secure Domains IP protection provided through system partitioning Software Hardware Secure OS IPC Hypervisor MIPS, PowerVR Heterogeneous Platform Offloads Secure Boot DRAM WAN LAN Imagination Technologies HGI Dec, 2014 p7

True Isolation Benefits Secure Extranet TEE Secure Intranet Mature, proven technology used in networking and Compute H/W Firewall high level of security Broadband App s Secure App s Crypto LAN App s Secure services can only affect their container Not the overall system Highest flexibility and performance Multiple Secure Domains IP protection provided through system partitioning Software Hardware Secure OS IPC Hypervisor MIPS, PowerVR Heterogeneous Platform Offloads Secure Boot DRAM WAN LAN Imagination Technologies HGI Dec, 2014 p8

Security no longer a CPU bound problem Secure Containers - Isolate concurrent flows Licensing Terms and IP Separation Partitioning of incompatible licensing terms Proprietary vs open source Security and Robustness Isolate critical software Reduction in application testing and certification S/W H/W VMn User -------- Kernel VM3 User -------- Kernel CPU Cluster VM2 User -------- Kernel User -------- Kernel Secure Hypervisor MMU Coherent Fabric SoC VM1 Network layers Offloads (Crypto, IP, etc) I/O vgpu 1 GPU Cluster MMU vgpu 2 Increase Privilege Memory Memory X Secure Domains Protected Partitions Imagination Technologies HGI Dec, 2014 p9 X TPM ------- Boot ROM

Summary Virtualization is indispensable to the future of embedded system design A secure Hypervisor is the foundation of a Secure and Reliable embedded system A virtualized environment offers flexible software management Virtualization provides Hardware firewall-grade security Scalability Reliability Total cost of ownership is dramatically reduced MIPS Virtualization is the right technology for the secure digital world Imagination Technologies HGI Dec, 2014 p10

Thank you www.imgtec.com Imagination Technologies HGI Dec, 2014 p11