Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Vpn-info.com.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Deploying GMP Applications Scott Fry, Director of Professional Services.
Information Security and Cloud Computing Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken 1 NKS.
Implementing an Untrusted Operating System on Trusted Hardware.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Computer Science HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang North Carolina.
New Direction for Software Protection in Embedded Systems Department of EECS University of Michigan Feb 22, 2007 Kang G. Shin.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee ISCA 2010 Princeton University.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
VROOM: Virtual ROuters On the Move Jennifer Rexford Joint work with Yi Wang, Eric Keller, Brian Biskeborn, and Kobus van der Merwe
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Towards Application Security On Untrusted OS
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Internet Protocol Security (IPSec)
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
Cloud Computing Cloud Security– an overview Keke Chen.
NW Security and Firewalls Network Security
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
COEN 252 Computer Forensics
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Security in Cloud Computing Zac Douglass Chris Kahn.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Security Vulnerabilities in A Virtual Environment
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Architecture Support for Secure Computing Mikel Bezdek Chun Yee Yu CprE 585 Survey Project 12/10/04.
Secure Offloading of Legacy IDSes Using Remote VM Introspection in Semi-trusted IaaS Clouds Kenichi Kourai Kazuki Juda Kyushu Institute of Technology.
Chapter 6: Securing the Cloud
Hardware-rooted Trust for Secure Key Management & Transient Trust
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
Trusted Computing and the Trusted Platform Module
Cloud Security– an overview Keke Chen
ABYSS : An Architecture for Software Protection
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Bastion secure processor architecture
AEGIS: Secure Processor for Certified Execution
User-mode Secret Protection (SP) architecture
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
SCONE: Secure Linux Containers Environments with Intel SGX
Shielding applications from an untrusted cloud with Haven
Security in SDR & cognitive radio
Security in Cloud Computing
Presentation transcript:

Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009

Motivation Trend towards hosted virtualized infrastructures –Enables companies to easily deploy new services –e.g., Amazon EC2 Hosted virtual networks –Infrastructure provider: owns/maintains routers –Service provider: leases slices of routers

Understanding Security Threats Service Provider wants –Control software running exactly as written –Data plane forwarding/filtering as instructed –Data plane performing with QoS promised –Confidentiality/Integrity of data –Availability Infrastructure Provider –Doesn’t want to be unjustly blamed Next: How are these possibly compromised 3

Old model: Owning the router Routing Processes Line Card Line Card Interconnect OS FIB1 Routing Processes NIC Interconnect OS fwdFIB1 Hardware-based routerSoftware-based router 4 Entire platform is trusted

New model: Hosted (threat 1) Routing Processes Line Card Line Card Interconnect OS FIB1 Virtualization layer Routing Processes NIC Interconnect OS Virtualization layer fwdFIB1 Infra. Provider can tamper with control software, data plane configuration (HW router), data plane implementation (SW router) Hardware-based routerSoftware-based router 5 Service provider Infra. provider fwdFIB1

New model: Shared (threat 2) Routing Processes Line Card Line Card Interconnect OS Routing Processes OS FIB1 FIB2 FIB1 FIB2 Virtualization layer Routing Processes NIC Interconnect OS Routing Processes OS Virtualization layer fwdFIB1FIB2 Hardware-based routerSoftware-based router 6 Service providers Infra. provider Pink service provider can attack virtualization layer Possible competitor of Blue service provider Affect operation of Blue service provider

Accountability Security threats lead to the need for accountability Accountable: Subject to the obligation to report, explain, or justify something; responsible; answerable [Random House] In hosted virtual infrastructure… –promised in the Service Level Agreement (SLA) 7

Outline of Approaches Detect –Network Measurement Prevent –Advances in Processor Architecture For each –Present solution possible today –Propose extension 8

Outline of Approaches Detect –Network Measurement Prevent –Advances in Processor Architecture For each –Present solution possible today –Propose extension 9

Monitoring SLA compliance Probe to determine: Loss rates Latency/Jitter Path taken To know how DP supposed to act: Log control messages (at boundaries) Model network and replay logs 10

Extending the Interface Card Treat interface card as trusted (trusting vendor) Enables performing measurement at each router –Reduces computation overhead –Improves accuracy –Improves amount of detail Enables independent verification 11

Outline of Approaches Detect –Network Measurement Prevent –Advances in Processor Architecture For each –Present solution possible today –Propose extension 12

Trusted Platform Module Recall what service provider wants –Control software running unmodified –Data plane acting as instructed –Data plane performing with correct QoS –Confidentiality/Integrity of data TPM: Chip on motherboard (on chip in future) –Encrypting storage –Attesting to integrity of system 13

TPM Limitations Does not protect against dynamic attacks –Can’t ensure software running unmodified Relies on chain of trust –Virtual machine verified by virtualization layer Implications –Can’t know if control processes started correctly and haven’t been modified –Can’t know if data plane acting as instructed with QoS (SW - Data plane is in virtualization layer) (HW – Configuration goes through virtualization layer) –Confidentiality of data not addressed 14

TPM needs physical separation Separate route processors (Logical routers) Remote control plane (4D, Ethane) Routing Processes NIC Interconnect OS Routing Processes OS Virtualization layer fwdFIB1FIB2 Routing Processes NIC Interconnect OS fwdFIB1FIB2 Minimal controller TPM Routing Processes OS TPM 3 rd Party Data Plane 15

Security Enhanced Processor TPM relies on physical separation Instead – extend processor architecture –Confidentiality/integrity of data and software –Encryption/decryption to/from memory –Examples: SP [ISCA05], AEGIS [MICRO03], XOM [ASPLOS00] –Minimal extra circuitry None designed for hosted/shared environment None made good business case –So no (very limited) success –Market size of hosted virtualized infrastructures provides the incentive 16

Protecting Software and Data Vendor installs private device key –Write only Service provider installs a secret key –Encrypted with device’s public key –Sent to infrastructure provider to install –Write only Service provider encrypts/hashes memory –With secret key Memory hashed and/or encrypted in main memory –Decrypted/verified when cache line pulled in –Encrypted/hashed when evicted 17

What’s the right approach? Measure+NICTPMvm-SP TrustOther infrastructure providers Vendor Run-time complexity HighMediumLow ConfidentialityNo Yes Main downside Accuracy vs computation / storage tradeoff Need to extend interface card Requires physical separation Need general purpose processor extension 18 Virtual Mode-SP (extended processor) provides protection desired, minimal complexity, with business incentives to make it reality.

Conclusion A step toward realizing hosted virtual networks New business model leads to new security issues –Platform is hosted and shared Can use monitoring to detect violations Better to rearchitect routers to prevent violations Future work: –Virtual Mode-SP for hosted virtualized infrastructures –Explore implications of trusting the vendor 19

Questions 20