Download presentation
Presentation is loading. Please wait.
Published byEsmond Joseph Modified over 6 years ago
1
Towards End-to-End Security Analysis of Networked Systems
Extending protocol analysis to include secure system primitives Deepak Garg, Jason Franklin, Dilsun Kaynar, and Anupam Datta
2
Virtual Machine Monitor
Secure Hamburgers User Level Programs Malicious Mustard Lettuce Operating System Layer diagrams specify both interfaces and dependences Virtual Machine Monitor Hardware * My apologies to any vegetarian or hungry members of the audience.
3
… Networked Secure Hamburgers Virtual Machine Virtual Machine Client
Malicious Mustard Virtual Machine Virtual Machine … Malicious Mustard Client Virtual Machine Monitor Malicious Mustard Memory Hardware Secure Co-processor Feisty Fries
4
Logic of Secure Hamburgers
Malicious local threads can corrupt unprotected data and code Malicious Mustard Killer Ketchup Key: Control Flow Hardware Resets Trusted Computing Technology old NEW!!! Memory Memory Protection Time As a first step towards model and analyzing networked secure systems we have added memory + memory protection etc… Prove you are safe from the killer ketchup… Threads Network Comm. Crypto.
5
Verifying Implementations
Checking implementations using model checkers (have found attacks against a security hypervisor SOSP Seshadri 07] Found vulnerabilities in hypervisor design and implementation
6
Hungry for More? CMU Theory of Secure Systems Project
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.