Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Vpn-info.com.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
SEC325 BitLocker™ Drive Encryption Deployment
BitLocker: deep details, improvements and benifits
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Sony White House Anthem Lockheed Aramco Bushehr nuclear reactor NSA Hacked Facebook Hacked Apple,Google,Microsoft,
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fifteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen.
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Five –
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Host and Application Security Lesson 4: The Win32 Boot Process.
Hands-On Microsoft Windows Server 2008
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
Trusted Computing Platform Alliance
A Design of Trusted Operating System Based on Linux BY LI HONGJUAN, LANYUQING The presenter Rusul J. ALSaedi Spring 2015 CS Dr. Rothstein.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Firmware Storage : Technical Overview Copyright © Intel Corporation Intel Corporation Software and Services Group.
Module 2 Configuring Disks and Device Drivers. Module Overview Partitioning Disks in Windows® 7 Managing Disk Volumes Maintaining Disks in Windows 7 Installing.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Wireless and Mobile Security
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Understand Encryption LESSON 2.5_A Security Fundamentals.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
Computer Security module October 2008 Mark D. Ryan HP Labs, Bristol University of Birmingham Trusted Platform Module (TPM) introduction.
Computer Security module October 2009 Mark D. Ryan University of Birmingham Trusted Platform Module (TPM) introduction.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources 1.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
Trusted Computing and the Trusted Platform Module
Trusted Infrastructure
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
תרגול 9 – Windows Security
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
Sai Krishna Deepak Maram, CS 6410
TPM, UEFI, Trusted Boot, Secure Boot
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Erica Burch Jesse Forrest
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three – Software Basis for TC January 26, 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Prelim Project 1A Pick an application that could benefit from the use of trusted computing. –Prepare 5-15 slides explaining the benefits for the application to use trusted computing and describing how trusted computing provides those benefits. OR

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Prelim Project 1B OR Pick an function critical for trusted computing. –Prepare 5-15 slides explaining the purpose of the function and how it is implemented or would be implemented within an operating system or hardware platform. OR

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Prelim Project 1B OR Pick an OS that has support for Trusted Computing. –Prepare 5-15 slides explaining how the OS provides important TC functions. What is the underlying basis for the trust, and how do applications use the functionality.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Software Basis for Trusted Computing Last week we discussed the hardware base – the TPM. This week we look at the requirements within an operating system for Trusted Computing.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE OS Concepts Trusted computing base Trusted path Separation of processes

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Trusted Computing Bases (TCB) That part of the system which is critical for security. –Vulnerability of the TCB affects the core security of the system. –Trusted Computing Extends the TCB across physical system boundaries. ▪Allows remote components to be part of the TCB for a particular function.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted Path Provides attestation of the system to the user. –Requires confidence in the hardware by the user. –Requires training of the user on how to invoke trusted path.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Separation of Processes Allows process that are trusted to run without interference from other processes. –Requires isolation that is provided by lower level trusted modules. –Include hardware support, much of which is already standard in chips, but some which is not.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Vista Security Technologies Summary of some of the support for trusted computing in Vista (on the following slides)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted Platform Module (TPM)? Smartcard-like module on the motherboard that: Performs cryptographic functions –RSA, SHA-1, RNG –Meets encryption export requirements Can create, store and manage keys –Provides a unique Endorsement Key (EK) –Provides a unique Storage Root Key (SRK) Performs digital signature operations Holds Platform Measurements (hashes) Anchors chain of trust for keys and credentials Protects itself against attacks TPM 1.2 spec: Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Why Use A TPM? Trusted Platforms use Roots-of-Trust –A TPM is an implementation of a Root-of-Trust A hardware Root-of-Trust has distinct advantages –Software can be hacked by Software ▪Difficult to root trust in software that has to validate itself –Hardware can be made to be robust against attacks ▪Certified to be tamper resistant –Hardware and software combined can protect root secrets better than software alone A TPM can ensure that keys and secrets are only available for use when the environment is appropriate –Security can be tied to specific hardware and software configurations Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Boot Windows Partition Contains  Encrypted OS  Encrypted Page File  Encrypted Temp Files  Encrypted Data  Encrypted Hibernation File Boot Partition Contains: MBR, Loader, Boot Utilities (Unencrypted, small) Where’s the Encryption Key? 1.SRK (Storage Root Key) contained in TPM 2.SRK encrypts VEK (Volume Encryption Key) protected by TPM/PIN/Dongle 3.VEK stored (encrypted by SRK) on hard drive in Boot Partition VEK2 3 Windows SRK 1 Disk Layout & Key Storage Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE BitLocker™ Architecture Static Root of Trust Measurement of early boot components Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Vista co-existence BitLocker encrypts Windows partition only You won’t be able to dual-boot another OS on the same partition OSes on other partitions will work fine Attempts to modify the protected Windows partition will render it unbootable –Replacing MBR –Modifying even a single bit Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE More on Vista signatures Don’t confuse hash validation with signatures x6 4 All kernel mode code must be signed or it won’t load Third-party drivers must be WHQL-certified or contain a certificate from a Microsoft CA –No exceptions, period User mode binaries need no signature unless they— Implement cryptographic functions Load into the software licensing service x3 2 Signing applies only to drivers shipped with Windows Can control by policy what to do with third-party Unsigned kernel mode code will load User mode binaries—same as x64 Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Code integrity non-goals Protecting from attackers with physical access Verifying the integrity of NTLDR –Requires secure startup on TPM-enabled machines –Requires read-only fixed media otherwise Supporting rebinding or hotpatching –These change the on-disk image –CI will work if patch includes updated hash Boot-time checks for revocation lists Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE More on Vista Loading New Super-Secret feature in 64 bit version of Vista (not TC related, but useful to know) –System files load at random locations in memory. –Uses no-execute feature in 64 bit chipsets.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Linux and Trusted Computing An IBM research project based –Foundations are TPM and Linux Security Modules Provides –TPM based trusted boot –Authenticated File Metadata –Also supports mandatory access controls

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Linux and Trusted Computing Future plans include –Integration with SELinux –Integration with Xen –Integration with encrypted file systems.