CSCI-UA.9480 Introduction to Computer Security
Session 3.3
Systems Security and Isolation
- Prof. Nadim Kobeissi
CSCI-UA.9480 Introduction to Computer Security Session 3.3 Systems - - PowerPoint PPT Presentation
CSCI-UA.9480 Introduction to Computer Security Session 3.3 Systems Security and Isolation Prof. Nadim Kobeissi Operating 3.3a System Security Basics 2 CSCI-UA.9480: Introduction to Computer Security Nadim Kobeissi Operating systems:
CSCI-UA.9480 Introduction to Computer Security
Session 3.3
Systems Security and Isolation
Operating System Security Basics
2 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiOperating systems: protection rings.
Examples.
4 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Kernel Standard Library User Programs Device Driver libcWhat’s managed by an operating system?
Principle of least-privilege.
POSIX permissions model.
7 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiPOSIX permissions model.
8 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiTest your knowledge!
9 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiWhat does the permission code 600 represent?
Test your knowledge!
10 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiWhat does the permission code 600 represent? Only the owner may read or write, but not execute. Group and public can do nothing. (-rw-------).
Isolation in operating systems.
11 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiIntel Trusted Platform Module (TPM).
12 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiIntel Trusted Execution.
13 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiIntel Software Guard Extensions (SGX).
14 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiCase Study: Apple T2 Chip
15 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiApple T2 Chip: Secure Enclave Component.
16 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Secure enclave:Apple T2 Chip: Secure Enclave Component.
17 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiApple T2 Chip: Core Concepts.
18 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiAES-XTS: Used only for disk encryption.
19 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Goal: prevent targeted malleability (easier in other modes such as CBC, CTR.)Apple Secure Boot.
20 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiTest your knowledge!
21 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiCan you think of any daily use applications with keys that macOS would benefit from storing inside T2/Secure Enclave?
Test your knowledge!
22 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiCan you think of any daily use applications with keys that macOS would benefit from storing inside T2/Secure Enclave?
Test your knowledge!
23 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiCan you think of any daily use applications with keys that macOS would benefit from storing inside T2/Secure Enclave?
File encryption with APFS Long-term keys for encrypted calls Long-term keys For secure messaging Code signing keysNext time: Mobile Security
24 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi