Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.

Slides:



Advertisements
Similar presentations
THE ORANGE BOOK Ravi Sandhu ORANGE BOOK CLASSES A1Verified Design B3Security Domains B2Structured Protection B1Labeled Security Protection.
Advertisements

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Operating System Security
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IT Security Evaluation By Sandeep Joshi
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
1 Steve Chenoweth Friday, 10/21/11 Week 7, Day 4 Right – Good or bad policy? – Asking the user what to do next! From malware.net/how-to-remove-protection-system-
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
CLEANROOM SOFTWARE ENGINEERING.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
IS2150/TEL2910: Introduction of Computer Security1 Nov 15, 2005 Assurance.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
CSE 303 – Software Design and Architecture
Topic (1)Software Engineering (601321)1 Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Panel Three - Small Businesses: Sustaining and Growing a Market Presence Open Interfaces and Market Penetration Protecting Intellectual Innovation and.
Engineering Secure Software. A Ubiquitous Concern  You can make a security mistake at every step of the development lifecycle  Requirements that allow.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
1 Common Evaluation Methodology for IT Security Part 2: Evaluation Methodology chapter 5-8 Marie Elisabeth Gaup Moe 06/12/04.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
TM8104 IT Security EvaluationAutumn Evaluation - the Main Road to IT Security Assurance CC Part 3.
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
The NIST Special Publications for Security Management By: Waylon Coulter.
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Engineering Secure Software. A Ubiquitous Concern  You can make a security mistake at every step of the development lifecycle  Requirements that allow.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CS457 Introduction to Information Security Systems
Information Security Policy
Cybersecurity First Principles
Chapter 1: Introduction
Introduction to Assurance
Software Quality Engineering
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
THE ORANGE BOOK Ravi Sandhu
Chapter 27 Security Engineering
How to Mitigate the Consequences What are the Countermeasures?
Chapter 29: Program Security
NSA Security-Enhanced Linux (SELinux)
Access Control What’s New?
Access Control Evolution and Prospects
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate School

What is Security? Enforce polices to protect information Confidentiality Prevent reading by unauthorized individuals Integrity Prevent unauthorized modification or corruption Ensure that information is available when needed

Trusted vs Trustworthy Many systems are trusted to enforce information security policies Depended upon to “do the right thing” Unfortunately Most systems are not very trustworthy Not compliant with stated protection functionality

The Paranoia Factor Most engineers care about functionality Does the system work as specified? Is performance good? Is it robust against failures Security engineers worry about exploitation Asymmetric threat: advantage adversary Unspecified functionality Careless operational practices

Threats Developmental Failure to meet specifications Insertion of trap doors Operational Poorly designed interfaces  user errors Unauthorized information flows via system metadata  covert channels Insecure configurations

Making Systems Trustworthy (for developers) Know what policy you want to enforce Formalize it, develop proofs of consistency and maintenance of secure state Develop a lifecycle approach to address developmental and operational threats Follow the secure lifecycle plan! Sounds easy takes enormous will power!

Is it Trustworthy? (for customers) Don’t just believe vendor claims Ask for third-party assessment Assessment should include Check of secure lifecycle process Check of system refinement Model to code Check that requirements were met Vulnerability analysis Analysis of functional and penetration testing Review of user and administrator guidance for completeness

Trusted System Requirements Maintain a domain for its own execution that protects it from external interference or tampering Maintain process isolation through the provision of distinct address spaces under its control Be internally structured into well-defined largely independent modules Modules designed such that the principle of least privilege is enforced The interface completely defined and all protection-critical elements of the identified

More Requirements Designed and structured to use a complete, conceptually simple protection mechanism with precisely defined semantics This mechanism shall play a central role in enforcing internal structuring of the protection-critical elements and of the system as a whole Incorporate significant use of layering, abstraction and data hiding Direct significant system engineering toward minimizing complexity and excluding modules that are not protection-critical

Developmental Approach

Assurance Requirements Today Configuration Management Life Cycle Support Development Architectural Design Functional Specification Implementation Representation Trusted Initialization High Level Design Low Level Design Representation Correspondence Security Policy Modeling Guidance Documents Testing Vulnerability Assessment Trusted Delivery

Questions for HW Developers Are the threats the same? What are the parallels for system development and for trusted hardware? How do you know that what is specified is what is encoded on the device? Can formal methods help?

Cynthia Irvine Naval Postgraduate School Karl Levitt National Science Foundation