Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Operating-System Structures
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Vpn-info.com.
1 Implementing an Untrusted Operating System on Trusted Hardware David Lie Chandramohan A. Thekkath Mark Horowitz University of Toronto, Microsoft Research,
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
Chap 2 System Structures.
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
1 Minimal TCB Code Execution Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Arvind Seshadri Carnegie Mellon University May 22, 2007.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
CSCE101 – Ch 3 September 14 & 16, Chapter 3 Computer Software = System Software + Application Software Delineation unclear – (ex. Microsoft Antitrust)
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
Computer Organization
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Trusted Computing Yaron Sheffer Manager, Standards.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
SODA Archiving October 2013
Computer and Information Science Computer Software Computer Software Chapter 1.2.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
VirtualBox What you need to know to build a Virtual Machine.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Operating Systems David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 432.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Systems Software Operating Systems. What is software? Software is the term that we use for all the programs and data that we use with a computer system.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Processes Introduction to Operating Systems: Module 3.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Silberschatz, Galvin and Gagne  Operating System Concepts UNIT II Operating System Services.
UNIX Unit 1- Architecture of Unix - By Pratima.
Wireless and Mobile Security
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
System Programming Basics Cha#2 H.M.Bilal. Operating Systems An operating system is the software on a computer that manages the way different programs.
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
TULSIRAMJI GAIKWAD-PATIL C OLLEGE OF E NGG. & T ECH. Seminar on “Palladium Cryptography” Presented by Amit S. Wankhade Guided by HoD Prof. Department of.
Introduction to Operating Systems Concepts
Presented by Mert Çetin
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Chapter 2: System Structures
Chapter 3: Operating-System Structures
User-mode Secret Protection (SP) architecture
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Chapter 2: Operating-System Structures
Operating Systems: A Modern Perspective, Chapter 3
Sai Krishna Deepak Maram, CS 6410
SCONE: Secure Linux Containers Environments with Intel SGX
Shielding applications from an untrusted cloud with Haven
Erica Burch Jesse Forrest
Chapter 2: Operating-System Structures
Presentation transcript:

Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA

Trusted Computing Overview of TCP How it works  Intel LaGrande  Microsoft NGSCB (Palladium) Uses Issues

Trusted Computing Group TCG formed by industry leaders Open standards for trustworthy computing Provides hardware and software security to combat several type of threat Moving towards PDAs, omnipresence

Features of Trusted Computers For business  Licensing  DRM For Users  Anti-hacker  Anti-virus  Backwards compatible  Can be turned off

LaGrande Intel’s hardware implementation Based on Arbaugh’s secure bootstrap Runs parallel to normal architecture Uses hash values for modification detection Operates in several different parts of chipset

LaGrande – Secure Bootstrap Higher abstraction layers only as secure as lower Trusted CPU, chipset, and boot ROM Each layer verifies hash of next layer before execution

LaGrande – Protected Environment Built on top of secure bootstrap architecture Instruction set extensions to create protected processor partition Extensions to create protected software stack Trusted platform module (TPM) verifies conditions Changes to I/O controller, memory controller, graphics controller, and CPU

LaGrande Separate execution space Separate memory space Secure mouse/keyboard Secure graphics

NGSCB Software side of TC Domain Manager aka Nexus Sealed Storage Remote Attestation

NGSCB – Nexus Security kernel, authenticated on boot Authenticates trusted programs Application interface to TPM Does not trust OS

NGSCB – Sealed Storage Encrypts data on storage device Key is not stored on storage device Hash of creating program stored with file TPM only decrypts for program that passes modification detection Decrypted only with same TPM / same program

NGSCB - Remote Attestation Communicate hashes of secure programs for remote verification of modification detection Ensures that client software functions as intended Kazaa vs. MPAA/RIAA

Uses Remote banking, business-to-business e-commerce, and online auctioning Corporate networking, document sharing Cheat-proof gaming enforcement Secure data storage Personal privacy protection, data management, and record keeping Shared computing and secure transactions Secure home computing Government agencies that require a high level of security and trust Software license enforcement Copyright enforcement

Issues GPL Who is in control – owners, MS, or content providers? Assumptions – hardware modifications possible Censorship

References Trusted Computing: Promise and Risk Ross Anderson’s site Anderson’s Patent Arbaugh Paper Inside Intel's Secretive 'LaGrande' Project