Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.

Slides:



Advertisements
Similar presentations
Rambling on the Private Data Security
Advertisements

Vpn-info.com.
Physical Unclonable Functions and Applications
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Section 3.2: Operating Systems Security
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
CS 0008 Day 2 1. Today Hardware and Software How computers store data How a program works Operators, types, input Print function Running the debugger.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
Trusted Computing Platform Alliance
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Unit 1 – Digital Literacy – Computer Terms Mr. M. Goldberg, Martingrove C.I., 2011 Digital Literacy Review By Mr. M. Goldberg – Martingrove C.I. October,
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
(ITI310) By Eng. BASSEM ALSAID SESSION 2: Server Configuration & Administration Notes SAT 31-Oct-2015.
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Understand Encryption LESSON 2.5_A Security Fundamentals.
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
Done by: Chelsea Bryan Friday, October 10,2014.   The BIOS (aka) Basic input/output system, is a built in software that determines what's a computer.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Information Systems Design and Development Security Precautions Computing Science.
Computer Security module October 2008 Mark D. Ryan HP Labs, Bristol University of Birmingham Trusted Platform Module (TPM) introduction.
Computer Security module October 2009 Mark D. Ryan University of Birmingham Trusted Platform Module (TPM) introduction.
UNM Encryption Services in Development
Tech Level Cyber Security
Presented by Mert Çetin
Presented by Kartik Patel
Trusted Computing and the Trusted Platform Module
Trusted Infrastructure
Hardware security: The use of a Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
PV204 Security technologies
Outline What does the OS protect? Authentication for operating systems
תרגול 9 – Windows Security
Uses Of Encryption Algorithms
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
ПРОГРАМСКИ ДЕЛ НА КОМПЈУТЕРОТ
TPM, UEFI, Trusted Boot, Secure Boot
Erica Burch Jesse Forrest
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
Function of Operating Systems
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Trusted Computing Initiative Beyond trustworthy

Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected Execution >Sealed Storage >Remote Attestation

What is Trusted Computing  Enhanced Hardware >TPM – Trusted Program Module  Encryption Chip (aka Fritz)  Secure Key Store  BIOS support  Used in IPL (Initial Program Load) >Aka Booting  Also used in encryption to avoid software >E.g Bitlocker, encrypted drives

Trusted Computing  Trusted Computing Group >Manufacturer Consortium >Control TPM specification  Required for US DoD equipment  TPM available on many systems (e.g. Dell, Toshiba)  Proposal: Trusted Network Connect  Further: >Next-Generation Secure Computing Base ­Aka Palladium ­Is Trusted Computing in Vista ­Some dilution – to avoid lockouts

TPM

Endorsement Key  Each TPM provides a unique internal Key  A RSA 2048 bit public/private key pair  Created randomly in chip manufacture  Private key never leaves chip and is secure  Public key used for encryption of data sent to chip  Chip memory and processes are hidden

Secure I/O  Also known as a trusted path  I/O can be secured with encryption keys  Motherboard paths secured by TPM  TPM must be bonded to motherboard so it cannot be reused elsewhere

Memory Curtain/ Protected Execution  Internal memory and computation of TPM is not visible  Motherboard may have memory hidden from Operating System  Can be implemented by some BIOS

Sealed Storage  TPM has its own endorsement store locked by internal keys

Remote Attestation  Certification originated from individual keys and identities of TPM

Application of Trusted Computing  Tamperproof booting >Uses TPM to compute secure signatures >Uses this to endorse each stage in the boot  BIOS uses TPM to identify authorised MBR >By storing measurement of MBR in TPM  MBR uses TPM to identify authorised IPL >E.g. boot loader  IPL uses TPM to identify authorised OS >E.g. Loads Windows after authentication

Application of Trusted Computing  Protecting Hard Drive Data >Uses Key Store & Encryption of TPM >Bitlocker in Windows >Enforcer in Linux  Can be done wrongly >Security boffins unveil BitUnlocker- Disk encryption decryptedSecurity boffins unveil BitUnlocker- Disk encryption decrypted  Or correctly >Bitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good nameBitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good name

Further Applications  Digital Rights Management >Authenticating Media Player Application >Authenticating Right to Media  Bootleg Software Prevention >Using TPM bootlegs cannot be loaded and used >Enforces Copyright  Identity Theft Prevention  Protection from Malware  Cheat Prevention in Online Games

The problems  Hardware Change Renders Software Inoperable  Hardware Change Renders Data Unreadable  Humans are Fallible >They Forget Keys!  Enforces Software Monopoly >Unable to modify & improve software  Protects Big Money Media >Users not in control of data  Independent Software & Media Harmed  People no Longer in Control of their own computer!  Enforced Censorship  Loss of anonymity & privacy

Trusted Computing and Virtualisation  TPM can be used with Virtual PCs  Establish a chain of trust links from BIOS  Tree-of-Trust

Bibliography  Trusted Computing in Wikipedia Trusted Computing in Wikipedia  TPM entry in Wikipedia TPM entry in Wikipedia  Trusted Computing Group in Wikipedia Trusted Computing Group in Wikipedia