Hardware-rooted Trust for Secure Key Management & Transient Trust

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Information Security and Cloud Computing Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken 1 NKS.
Implementing an Untrusted Operating System on Trusted Hardware.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Chapter 6 Security Kernels.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Figure 1.1 Interaction between applications and the operating system.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
1 RAKSHA: A FLEXIBLE ARCHITECTURE FOR SOFTWARE SECURITY Computer Systems Laboratory Stanford University Hari Kannan, Michael Dalton, Christos Kozyrakis.
Key Management in Cryptography
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Chapter 2 Securing Network Server and User Workstations.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Wireless and Mobile Security
Introduction to Operating Systems Concepts
Web Applications Security Cryptography 1
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
Trusted Computing and the Trusted Platform Module
Chapter Objectives In this chapter, you will learn:
Protecting Interprocess Communications
CS6401- OPERATING SYSTEMS L T P C
Cryptography and Network Security
New Cache Designs for Thwarting Cache-based Side Channel Attacks
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
ABYSS : An Architecture for Software Protection
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Hardware Cryptographic Coprocessor
Outline What does the OS protect? Authentication for operating systems
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
RANDOM FILL CACHE ARCHITECTURE
Operating Systems and Systems Programming
Chapter 1: Introduction
Operating Systems Security
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
Number Representations and Basic Processor Architecture
Authority-mode Secret Protection (SP) architecture
Secure Processing On-Chip
Virtualization Techniques
Bastion secure processor architecture
Computer Security Distributed System Security
AEGIS: Secure Processor for Certified Execution
Security & .NET 12/1/2018.
User-mode Secret Protection (SP) architecture
Today’s agenda Hardware architecture and runtime system
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Computer Organization
Components of a CPU AS Computing - F451.
Operating Systems: A Modern Perspective, Chapter 3
CDK: Chapter 7 TvS: Chapter 9
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Outline Operating System Organization Operating System Examples
Erica Burch Jesse Forrest
Database System Architectures
Network File System (NFS)
Overview of Computer system
Presentation transcript:

Hardware-rooted Trust for Secure Key Management & Transient Trust Jeffrey Dwoskin and Ruby B. Lee Princeton Architecture Laboratory for Multimedia and Security Department of Electrical Engineering, Princeton University Background and Motivation Architecture Overview Threat Model Crisis Response Scenario Software attacks – Compromise OS & apps Physical attacks – Security boundary of μ-chip Replace SW; Access disk, memory, buses; etc. Day-to-day use with initial secrets Crisis Preparation Negotiate with 3rd parties for access to data Determine key-distribution and usage policies for various potential crises Setup certificates to distribute to each device Crisis Begins Determine delegation to devices based on actual crisis at-hand Authenticate each device; distribute keys & policies Crisis Operations Retrieve data from 3rd parties Negotiate additional authorizations as needed Post-crisis Revocation Policy-controlled secrets have expiration/limits Direct revocation by authority to each device End crisis with 3rd parties to stop sending data Our new Authority-mode SP (Secret Protection) architecture provides key management and trust in portable devices used remotely A few master secrets stored on-chip, as hardware roots of trust, supported by small trusted software One example is Crisis Response, where a crisis management authority wants to manage keys and data (secrets) shared with first responders. Two master secrets on-chip are HW roots of trust Trusted Software Module (TSM) is flexible SW provided by authority to protect data, keys, policies in Secure Storage, using master secrets HW Concealed Execution Mode protects TSM Hardware Architecture Master secrets in non-volatile registers, restricted to access only by TSM code Device Root Key, Storage Root Hash New registers and instructions are very small additions to base processor (not shown to scale) Disk RAM User I/O Operating System User App 1 Processor Chip Storage Root Hash Authority App Trusted Software Module Device Root Key Concealed Execution Mode User App 2 Trust Models ‘Remote Trust’ model with a central authority owning multiple SP devices used remotely in the field by first responders Authority wants to share keys and data with the devices, but maintain control over how they are used. These secrets are owned by 3rd parties, not by the users Each SP device shares a key with authority, protected by hardware, as basis of trust ‘Transitive Trust’ model 3rd party data owners delegate to authority for access control of keys and policies. Data sent directly to devices, which enforce policies. Storage Root Hash Derived Keys Device Root Key L Interrupt Hash Int Addr Mode Original Core L1 Instr Cache w/ Tags L1 Data L2 Encrypt/ Hash Engine Secure BIOS BIOS RAM Secure Storage Secure storage managed by TSM Protected with keys derived from DRK in HW Concealed Execution Mode (CEM) Related and Future Work Authority SP Device 1 2 n … Crisis Management ____ K1 K2 Kn Code Integrity Checking (CIC) Runtime checking of TSM code TSM code broken into cache-line sized blocks and “signed” with MAC from Device Root Key in advance Code integrity is verified by CEM HW as blocks are fetched into on-chip caches Execution protection for TSM Protection of general registers on interrupts Registers encrypted; hash & interrupt address stored in registers on-chip; reverse on return from interrupt Protections of intermediate data in memory Explicit Secure Load/Store instructions for TSM code Tagged in on-chip caches, encrypt/MAC off-chip Derived Keys Device Root Key (DRK) Root Storage Root Hash (SRH) Item Data Keychain Key Policy Encrypt & MAC Sensor-mode SP Scaled-down architecture for key management in tiny sensor nodes using same roots of trust SecureCore Integrate Authority-mode SP into clean-slate security architecture design with partitioned security-kernel. Implementation Software emulation of SP hardware and virtual machine implementation in progress TSM DRK Addr 1 Addr 2 Addr 3 Addr 4 MAC Addr 5 Secure Communications Summary and Conclusions Mutual authentication using derived keys to setup secure communication channel Authority can send new keys & policies or revoke existing keys. SP architecture enables: Remote trust Transitive trust: protect use of 3rd party keys that don’t belong to the user Transient trust: support for access to keys on a temporary basis Policy-controlled use of keys, enforced by authority’s software Flexible TSM SW for many usage scenarios Using only two HW roots of trust, no burnt-in secrets, and only symmetric key cryptography Defends against SW & HW attacks Authority SP Device Generate Session Keys Comm. key for Authority to Device: KA→D = MACDRK(Constants, NA, ND) Comm. key for Device to Authority: KD→A = MACDRK(Constants, ND, NA) Exchange Nonces: NA, ND Mutual Authentication Secure Communications KA→D KD→A … Crisis Management Authority SP Device 1 K1 3rd Party A KA KB B 2 K2 n Kn Initialization Authority initializes each device at a secure depot Authority has secure servers and databases Generate Device Root Key and save on-chip and in authority’s database Verify and sign TSM code (with Device Root Key) Install system software and TSM Initialize secure storage with initial secrets, policy Jeffrey S Dwoskin, Ruby B. Lee, "Hardware-rooted Trust for Secure Key Management and Transient Trust", ACM Conference on Computer and Communications Security (CCS) 2007, Alexandria, VA, pp. 389-400, October 2007.