Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Chapter 6 Security Kernels.
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Chapter 1 – Introduction
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Figure 1.1 Interaction between applications and the operating system.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Cryptography, Authentication and Digital Signatures
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
G53SEC 1 Reference Monitors Enforcement of Access Control.
Forward: Preventing XML Signature Wrapping Attacks in Cloud Computing Prepared by: Abdulaziz AlShammari Professor Ramasamy Uthurusamy April10, 2014.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Part 7: State of the Art and Future u Are we in a sorry state? u How to keep us Safe? u Software trust management u Hardware trust management u Evasive.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Final Exam Review. Common Attack Techniques Stack overflow – Basic version – Advanced versions Mitigations – Canary – W^X page – ASLR.
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Introduction to Operating Systems Concepts
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
UNIX System Protection
How to Mitigate the Consequences What are the Countermeasures?
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Erica Burch Jesse Forrest
Security in SDR & cognitive radio
Access Control What’s New?
Presentation transcript:

Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany

Introduction Trusted Computing Trusted Computing also Includes: System state integrity and the secure link In this paper, security patterns was introduced for secure boot and for secure storage. Secure boot is at the heart. It ensures that the integrity of software is verified before accessing stored data.

Introduction (Contd..) We present the patterns underlying two fundamental TC concepts: Secure boot and Secure storage. Secure boot :software that violates the integrity properties cannot be loaded. A variant of this pattern, termed Authenticated boot. Secure storage is a crucial application-level requirement in many scenarios.

SECURE BOOT PATTERN Intent: How to ensure that violations of integrity properties of the software stack. Example: How can the user be sure that the system software is in the intended operational state? Context: On conventional platforms, software can be manipulated or exchanged.

SECURE BOOT PATTERN Problem: Before applications can be used on a computer system, the system has to be bootstrapped. The bootloader loads the operating system kernel, and the operating system kernel loads system services, device drivers, and other applications. At any stage of the bootstrap process, software components could have been exchanged or modified by another user or by malicious software that has been executed before.

SECURE BOOT PATTERN The following forces have to be resolved: You want to ensure the integrity of the loaded software on the system. You want the computer system to always boot in a welldefined secure state. You want to allow modifications of the operating system or application binaries.

SECURE BOOT PATTERN Solution: Every stage is responsible for checking the integrity of the next stage. Integrity checking can be performed in different ways comparing hash values verifying digital signatures.

SECURE BOOT PATTERN Figure 1. Elements of the Secure Boot pattern.

SECURE BOOT PATTERN Known Uses: AEGIS The Cell Broadband Engine processor Consequences: Example Resolved: Related Patterns: Boot Loader Authenticator

SECURE STORAGE PATTERN Intent: Secure storage provides confidentiality and integrity for stored data, and additionally enforces access restrictions on entities that want to access data. Example: Consider the problem of storing passwords (e.g., for webservices) securely on a computer. Context : You need to provide storage that protects the confidentiality and integrity of stored data.

SECURE STORAGE PATTERN Problem: Cryptographic techniques exist to protect the confidentiality and integrity of data. The following forces have to be resolved: confidentiality and integrity ofdata secret cryptographic keys modifications of the operating system or application binaries

SECURE STORAGE PATTERN Solution: Root Key Root Key and Root Key Control are both protected by trusted hardware

SECURE STORAGE PATTERN Structure: Figure 2. Elements of the Secure Storage pattern.

SECURE STORAGE PATTERN Known Uses: The Cell processor features storage that can only be accessed when the processor is in a “secure state”. Example Resolved: Consequences: Only software where the integrity verification succeeded can access the protected data. Data can be stored on a system, such that it can be accessed only when the authorized operating system and software has been started.

SECURE STORAGE PATTERN Related Patterns: Secure Storage requires Secure Boot to protect the integrity verification data Secure Storage also requires Controlled Virtual Address Space Information Obscurity

Secure boot Secure storage Variety of patterns based on implementation requirements CONCLUSION