Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.

Slides:



Advertisements
Similar presentations
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Advertisements

SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing -Lecture Twelve.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
COMP 110 Introduction to Programming Tabitha Peck M.S. January 9, 2008 MWF 3-3:50 pm Philips 367.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
General information CSE 230 : Introduction to Software Engineering
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Systems Analysis and Design for Electronic Commerce, Networked Business Processes, and Virtual Enterprises Walt Scacchi, Ph.D. GSM 271 and FEMBA 271 Spring.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
SERC Security Systems Engineering Initiative Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fifteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Eleven.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
CSE 322: Software Reliability Engineering Topics covered: Course outline and schedule Introduction, Motivation and Basic Concepts.
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
COMP 14 – 02: Introduction to Programming Andrew Leaver-Fay August 31, 2005 Monday/Wednesday 3-4:15 pm Peabody 217 Friday 3-3:50pm Peabody 217.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Distributed Systems Shahab Baqai Lahore University.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
IT Tech Recording and Virtual Machines Doug Waterman.
A First Course in Information Security
Computer Network Fundamentals CNT4007C
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Course Introduction Software Engineering
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
CGS-2531 Problem Solving with Computer Software Course home page: Course.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
CSCI 51 Introduction to Computer Science Dr. Joshua Stough January 20, 2009.
IT:Network:Microsoft Server Instructor: Michael J. Teske.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for the Final Exam December 8, 2008.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
 Lê Nhật Duy.  Reference books  Subject introduction  Examination  Rules.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 8/24/2015)
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 NES554: Computer Networks Defense Course Overview.
Computer Networks CNT5106C
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
ICS 151 Digital Logic Design Spring 2004 Administrative Issues.
INF526: Secure Systems Administration Course Introduction Prof. Clifford Neuman Lecture 1 24 May 2016 OHE100C.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Welcome to EECS 395/495 Networking Problems in Cloud Computing
NTC 326Competitive Success/snaptutorial.com
NTC 326 Education for Service-- snaptutorial.com
Crowd Simulation (INFOMCRWS) - Course Introduction
Administrative Issues
Week1 software - Lecture outline & Assignments
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes Spring 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Class home page –Preliminary Syllabus –Assigned Readings –Lecture notes –Assignments

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Who gets in Class size just increased to 30 –To add at this point requires my permission –See me and explain your interests and qualifications.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Structure of lecture Classes from 1:00 PM – 3:20 PM –10 minute break halfway through –In later lectures, final half of lecture will be for discussion of projects. –Students will have an opportunity to lead discussions about their projects.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Class Instructor –Dr. Clifford Neuman –Office hours Friday 10:45-11:45 SAL 212

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administration Grading –Preliminary Projects 20% –Mid-term exam 30% –Project and Paper 50% –Class participation ▪up to 20% bonus

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Projects Individual or Group project –Design or design and implement ▪Trusted computing support/middleware or ▪Trusted computing application –Write paper about the project

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Participation Early Design Exercises will promote class discussion –Students to pick an application (in groups is OK) –Prepare a 15 minute lecture on impact of Trusted computing in that application areas. –Present to class and lead discussion.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture One – Introduction January 12, 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted vs. Trustworthy We trust our computers –We depend upon them. –We are vulnerable to breaches of security. Our computer systems today are not worthy of trust. –We have buggy software –We configure the systems incorrectly –Our user interfaces are ambiguous regarding the parts of the system with which we communicate.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE A Controversial Issue Many individuals distrust trusted computing. One view can be found at –An animated short film by Benjamin Stephan and Lutz Vogel

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What is Trusted Computing Attestation –Includes Trusted path Separation –Secure storage (data/keys) –Protection of processes The rest is policy –That’s the hard part –And the controversial part

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Outline of Course – First Half What is it Hardware Software Virtualization Encryption Policy

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Outline of Course – Second Half Case Studies Managing Domains Negotiation Obligation

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Landscape – Early Work Multics System in late 1960s. –Trusted path, isolation. Paper on Digital Distributed System Security Architecture by Gasser, Goldstein, Kauffman, and Lampson. –Described early need for remote attestation and how accomplished.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Landscape – Industry Industry interest in the late 1990s. Consortia formed such as the Trusted Computing Group. Standards specifications, starting with specs for hardware with goal of eventual inclusion in all new computer systems. –Current results centered around attestation and secure storage.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Landscape – Applications Digital Rights Management Network Admission Control –PC Health Monitoring –Malware detection Virtualization of world view –VPN Segregation –Process control / SCADA systems Many other users

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Discussion - Risks Trusted computing is a tool that can be misused. –If one party has too much market power, it can dictate unreasonable terms and enforce them. Too much trust in trusted computing. –Attestation does not make a component trustworthy. –Some will rely too much on certifications.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Discussion - Benefits Allows systems to be developed that require trustworthy remote components. –Provides protection of data when out of the hands of its owner. Can provides isolation and virtualization beyond local system. –Provides containment of compromise.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Discussion – What’s missing Tools to manage policy –Managing policy was limitation for TC support in Vista Applications that protect the end user –We need more than DRM and tools to limit what users run. New architectures and ways of thinking about security.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE For Next Week Topic: Hardware Basis for Trusted Computing Reading: PC Client, Trusted Platform, and Trusted Network connect specifications –