0 Penn State, NSRC Industry Day, 10-17-2006 Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems.

Slides:



Advertisements
Similar presentations
SecureBus: Towards Application- Transparent Trusted Computing with Mandatory Access Control Xinwen Zhang 1, Songqing Chen 2 Michael J. Covington 3, and.
Advertisements

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
1 Trusted Server Environments IEEE CQR – Ft. Myers, FL May 2007 Frank Tycksen – VP of Engineering at SignaCert, Inc.
McAfee One Time Password
Trusted System Elements and Examples CS461/ECE422 Fall 2011.
Operating System Security
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O Presenter: Probir Roy Computer Science Department College of William & Mary.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Chapter 6 Security Kernels.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Preventing Theft of Quality of Service on Open Platforms Kwang-Hyun Baek and Sean W. Smith Department of Computer Science Dartmouth College
1 Minimal TCB Code Execution Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Arvind Seshadri Carnegie Mellon University May 22, 2007.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
8.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Using Digital Credentials On The World-Wide Web M. Winslett.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Architecture overview 6/03/12 F. Desprez - ISC Cloud Context : Development of a toolbox for deploying application services providers with a hierarchical.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Clinic Security and Policy Enforcement in Windows Server 2008.
ISA 562 Internet Security Theory & Practice
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
服务计算技术与系统教育部重点实验室 (SCTS) 集群与网格计算湖北省重点实验室 (CGCL) CFCC: Covert Flows Confinement For VM Coalitions Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, and Alex K. Ohoussou.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
AUTHORS: MIKE P. PAPAZOGLOU WILLEM-JAN VAN DEN HEUVEL PRESENTED BY: MARGARETA VAMOS Service oriented architectures: approaches, technologies and research.
Secure Operating System. Mandatory Protection Systems Problem of discretionary access control: untrusted processes can modify protection states Mandatory.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Configuring Network Access Protection
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Trusted Platform Module as Security Enabler for Cloud Infrastructure as a Service (IaaS). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Challenges.
Virtualization Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Secure Operating System
Hardware-rooted Trust for Secure Key Management & Transient Trust
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
Secure Operating System Example: SELinux
Implementing Network Access Protection
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
IS4680 Security Auditing for Compliance
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Enabling the hybrid cloud with remote access appliances
SCONE: Secure Linux Containers Environments with Intel SGX
NSA Security-Enhanced Linux (SELinux)
Day 2, Session 2 Connecting System Center to the Public Cloud
Presentation transcript:

0 Penn State, NSRC Industry Day, Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems Linux Security Modules –Verify Complete Mediation of the Reference Monitor Interface –Found and fixed six bugs [USENIX Sec 2002][ACM CCS 2002][ACM TISSEC 2004] SELinux Policy Analysis –Identify Low Integrity Flows to High Integrity Subjects –Prove Integrity Protection of Apache, SSH, vsftp, and Linux TCB services [USENIX Sec 2003][ACM TISSEC 2003][NDSS 2006] Labeled IPsec –Integration of IPsec and SELinux for Mandatory Network Control –Accepted into mainline Linux kernel in [SecureComm 2006] Lessons Learned –Comprehensive Mandatory Access Control for Linux –But Comprehensive MAC policies are complex –And MAC is expanding to distributed systems Can We Provide Practical Integrity in Distributed Systems?

1 Penn State, NSRC Industry Day, Shared Reference Monitor (Shamon) Virtual Machine Monitor Virtual Machine Appl (Jif) Virtual Machine Appl Virtual Machine Bad Virtual Machine Monitor Virtual Machine Appl (Jif) Virtual Machine Appl Virtual Machine Bad Use remote attestation of enforcement to ensure goals TPM

2 Penn State, NSRC Industry Day, Shamon Motivation Reference Monitor Goals –Can be extended to distributed systems Tamperproofing: Remote Attestation –Hardware-based integrity measurement –Prove integrity to remote parties [USENIX Sec 2004][ACM CCS 2004][SACMAT 2006] Complete Mediation: Virtual Machine Systems –Coarse-grained Mandatory Access Control (Xen sHype) –Simplify MAC policies [ACSAC 2005] [ACSAC 2006] Comprehensive Verification: Information Flow Aware Software Development –Build client and server applications that enforce system information flow policies –Comprehensive MAC enforcement [submitted to NDSS 2007] Retrofitting Legacy Code –Add specific security functions to existing code –Enable transition from legacy to comprehensive MAC enforcement [ACM CCS 2005][IEEE S&P 2006][ICSE 2006] A Number of Emerging Technologies Motivate the Construction of Distributed Mandatory Access Control

3 Penn State, NSRC Industry Day, Shamon Applications Grid Applications Distributed Service Level Agreements Internet Suspend/Resume Remote Medicine Common Thread: All are trying to prove that they are doing the right thing

4 Penn State, NSRC Industry Day, Shamon Challenges Build up Trust from Secure Hardware –Secure Hardware is basis for system integrity –Can it also be a basis for trust in credentials? Usable Attestations –Verification must be practical, robust, private –Can we express integrity in simple, scalable terms? User Authentication –User authenticates system and vice versa –How does a user know which secure hardware goes with which system? Security Policy and Goals –Obtain policy and labeling –How do we identify security goals and prove compliance scalably? Maintain Trust –Logic representation –How do we show that all machines in a coalition are trustworthy?

5 Penn State, NSRC Industry Day, Summary Mandatory Access Control Is Becoming Ubiquitous –E.g., Linux Security Modules Virtual Machines Are Becoming Ubiquitous –Intel VM Systems Other Technologies Are Emerging –Remote Attestation, Information Flow Aware Applications, Legacy Code Retrofitting Shamon: Architecture for Distributed MAC Enforcement –Attestation enables the expansion of reference monitor guarantees to distributed systems –Initial prototype [ACSAC 2006] Leadership in MAC Architectures –NSF-Funded project –High Assurance Platform –Virtual Machine Security –Collaborate with Industry