1 September 1, 2014.  Motivation  Background  TrustDump Architecture  Implementation Details  Evaluation  Summary 2.

Slides:



Advertisements
Similar presentations
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Advertisements

purpose Search : automation methods for device driver development in IP-based embedded systems in order to achieve high reliability, productivity, reusability.
Embedded System Lab. What is an embedded systems? An embedded system is a computer system designed for specific control functions within a larger system,
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Chapter 6 Security Kernels.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
OS Spring’03 Introduction Operating Systems Spring 2003.
1 Last Class: Introduction Operating system = interface between user & architecture Importance of OS OS history: Change is only constant User-level Applications.
An Out-of-the-Box Approach to High Assurance Computer System Monitoring and Integrity Protection Cyber Defense Conference, Rome, NY, May 12-14, 2008 Assistant.
@ NCSU Zhi NCSU Xuxian Microsoft Research Weidong Microsoft NCSU Peng NCSU ACM CCS’09.
1 OS & Computer Architecture Modern OS Functionality (brief review) Architecture Basics Hardware Support for OS Features.
Operating System Support for Virtual Machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Jiang Wang, Joint work with Angelos Stavrou and Anup Ghosh CSIS, George Mason University HyperCheck: a Hardware Assisted Integrity Monitor.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
Android Security GROUP MAY 1208 Alex Frisvold Alex Meyer Nazmus Sakib Eric Van Buren.
Senior Design May AbstractDesign Alex Frisvold Alex Meyer Nazmus Sakib Eric Van Buren Our project is to develop a working emulator for an Android.
Building Trusted Path on Untrusted Device Drivers for Mobile Devices
Tanenbaum 8.3 See references
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Hands-On Microsoft Windows Server 2008
Author : Jiang Wang, Angelos Stavrou, and Anup Ghosh Conference: RAID 2010 Advisor: Yuh-Jye Lee Reporter: Yi-Hsiang Yang
2017/4/21 Towards Full Virtualization of Heterogeneous Noc-based Multicore Embedded Architecture 2012 IEEE 15th International Conference on Computational.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
MICROPROCESSOR INPUT/OUTPUT
Operating System Support for Virtual Machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Improving Network I/O Virtualization for Cloud Computing.
Protecting Data on Smartphones and Tablets from Memory Attacks
TrustOTP: Smartphone as One-Time Password Token
VirtualBox What you need to know to build a Virtual Machine.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Bart Miller – October 22 nd,  TCB & Threat Model  Xen Platform  Xoar Architecture Overview  Xoar Components  Design Goals  Results  Security.
Midterm Meeting Pete Bohman, Adam Kunk, Erik Shaw.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Operating Systems Security
Wireless and Mobile Security
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Information Security - 2. Objectives of this course A solution to these issues A collective effort of Architecture, OS, Compiler and Application Developers.
VMM Based Rootkit Detection on Android
بسم الله الرحمن الرحيم MEMORY AND I/O.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Embedded Systems Design with Qsys and Altera Monitor Program
Pushpin Computing System Overview Joshua Lifton et. al Ubicomp class reading Presented by BURT.
Android Security GROUP MAY 1208 Alex Frisvold Alex Meyer Nazmus Sakib Eric Van Buren.
RASPBERRY-PI. ARM11 FEATURES  The ARM1176™ applications processors deployed broadly in devices ranging from smart phones to digital TV's to eReaders,
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Introduction to Operating Systems Concepts
Homework Reading Machine Projects Labs
Development of an Embedded Platform for Secure CPS Services
Crash Dump Analysis - Santosh Kumar Singh.
Hardware Support for Embedded Operating System Security
TZVisor: Decouple the Trusted Execution from Hypervisor
By Dunlap, King, Cinar, Basrai, Chen
Operating System Support for Virtual Machines
LAB 01 Installation of VIRTUAL MACHINE and LINUX
Windows Virtual PC / Hyper-V
SCONE: Secure Linux Containers Environments with Intel SGX
Shielding applications from an untrusted cloud with Haven
Computer System Laboratory
In Today’s Class.. General Kernel Responsibilities Kernel Organization
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

1 September 1, 2014

 Motivation  Background  TrustDump Architecture  Implementation Details  Evaluation  Summary 2

 Motivation  Background  TrustDump Architecture  Implementation Details  Evaluation  Summary 3

 In-the-box approach (Thing et al., 2010; Sylve et al., 2011) Vulnerable to armored malware using anti-forensics  Virtual Machine Introspection (VMI) (Yan et al., 2012) Trusted Computing Base (TCB) is large  Hardware-based solution: ( Android Debug Bridge (ADB), JTAG, Chip-off) ADB and JTAG: need the support of the forensic target Chip-off: physical damage and usually irreversible 4

 Reliable Against malicious mobile OS Withstand mobile OS crash  Small TCB  Non-invasive 5 ARM TrustZone

 TrustZone A system-wide approach Two isolated execution domains: secure domain and normal domain  TZIC (TrustZone Interrupt Controller) Secure interrupt--FIQ Non-secure interrupt--IRQ  GPIO (General Purpose I/O) 6

 Trusted Application (TA) deployed in TrustZone in the payments at point of sale (POS) (Marforio et al., NDSS’14)  Trusted Language Runtime in TrustZone (Santos et al., ASPLOS’14)  Isolate Guest OS and Hypervisor with TrustZone (Kalkowski et al., FOSDEM ’14) 7

8

 TrustDump Deployment Port Rich OS to the normal domain Install the TrustDumper in the secure domain  Reliable Switching Non-maskable interrupt (NMI)  Data Acquisition and Transmission Online and offline memory forensics 9

 Freescale i.MX53 Quick Start Board A Cortex-A8 1GHz Processor 1GB DDR3 RAM 4GB MicroSD card  Android in normal domain  Thinkpad-T430 10

 Android Porting Based on the Board Support Package published by Adeneo Embedded Intended to run in the secure domain  Access resource of secure domain in normal domain: secure I/O interfaces void secure_write(unsigned int data, unsigned int pa); unsigned int secure_read(unsigned int pa);  Self-contained TrustDumper in the secure domain 11

12

 Configure User-defined button 1 as NMI I. Enable FIQ exception: CPSR.F=0 II. Ensure CPSR.F cannot be modified by the normal domain: SCR.FW=0 III. Enforce the ARM processor to branch to the monitor mode on an FIQ exception: SCR.FIQ=1 IV. Configure GPIO-2 as secure peripheral 13

 Button 1 is for NMI in secure domain and Button 2 is used as the Home Key in normal domain 14 Disable the non-secure access to Button 1 The non-secure access to Button 2 is disabled User-defined Button 1 and 2 share the same access policy

 Set the peripherals sharing the same policy as secure peripheral  Release those peripherals needed in the normal domain by adding them into the Whitelist in secure domain  The Rich OS uses the secure I/O interfaces to access the released peripherals 15

 One interrupt number for all the 32 pins of GPIO-2  Button 2 will trigger the same NMI, instead of serving as the Home Key as designed in the Rich OS  Forward the interrupt requests of button 1 and button 2 to different domains 16

17 Button 1 Button 2

 Data Acquisition and Transmission  Integrity Checking and Rootkit Detection 18 stack pointer & (0x1FFFF)

 Switching time NMI: 1.7 us SMC: 0.3 us  Memory Dumping Performance 19 Scale (Byte)Bit rate (bit/s) DMACPU K K  Analysis time Kernel Integrity Checking: hardware (1.56 ms), software (578.6 ms) Processes Traversing: 2.13 ms

 TrustDump Reliable memory acquisition mechanism based on TrustZone Hardware-assisted isolation NMI as the reliable switching Fine-grained peripheral control and fine-grained interrupt control 20

21