First year review WP4 overview
Trento - September 24th, 2007
First year review WP4 overview Trento - September 24th, 2007 Goal - - PowerPoint PPT Presentation
First year review WP4 overview Trento - September 24th, 2007 Goal of WP4 Trust and Security Analysis of the various SW-based and combined HW/SW-based methods for the RE-TRUST problem 2 Participants UNITN (WP leader) Team:
Trento - September 24th, 2007
2
Team:
Yoram OFEK
Bruno CRISPO
Amitabh SAXENA
Jasvir NAGRA
Paolo TONELLA
Team:
Bart Preneel Preneel
Brecht WYSEUR
Team:
Jean-
Daniel AUSSEL
Jerome D’ ’ANNOVILLE ANNOVILLE
Team:
Mario BALDI
Stefano DI CARLO
Paolo FALCARIN
Team:
Igor KOTENKO
Vasily DESNITSKY DESNITSKY
Victor VORONTSOV
Vitaly BOGDANOV BOGDANOV
[POLITO] – M24
methods [POLITO] – M30
Computing (TC) [UNITN] - M36
protocols [SPIIRAS] - M30
9
M1 M2 M3 M4 M5 M6 M7 M8 M9 M10 M11 M12 M13 M14 M15 M16 ...
T4.1 T4.1 T4.2 T4.2 T4.3 T4.3 T4.4 T4.4 T4.5 T4.5
10
M17 M18 M19 M20 M21 M22 M23 M24 M25 M26 M27 M28 M29 M30 M31 M32 ...
T4.3 T4.3 T4.2 T4.2 T4.4 T4.4 T4.5 T4.5 T4.1 T4.1
11
T4.1 T4.1
12
Untrusted platform Untrusted platform HW HW OS OS P P M M Trusted platform Trusted platform
TAG seq. TAG seq. TAG seq. TAG seq.
TAG TAG Validation Validation Monitor Monitor factory factory
M
i t
r e p l a c e m e n t M
i t
r e p l a c e m e n t Monitor replacement Monitor replacement
13
T4.1 T4.1
14
T4.1 T4.1
15
(Analysis)
tampered one
mode access of program code
network
T4.1 T4.1
16
(Analysis)
invariants
monitoring
T4.1 T4.1
important
assertion.
T4.1 T4.1
18
(Analysis)
T4.1 T4.1
19
(Analysis)
attacker effort, not best-attacker effort
T4.1 T4.1
20
(Analysis)
the time attacker takes to reverse-engineer it
diverse monitors
program to prevent separation
T4.1 T4.1
21
(Analysis)
T4.1 T4.1
22
T4.3 T4.3
23
T4.3 T4.3
24
(Analysis)
T4.3 T4.3
25
Low level code only / Low + High level code
Extract key / watermark, bypass sections of code, alter behavior
Renaming / Flattening / Opaque predicates / Snippets, etc
Java, C/C++
Debuggers, de-compilers, emulators, slicers, compilers, etc Partial information of program to be reverse engineered
T4.3 T4.3
26
T4.5 T4.5
27
constitute components in a complete system
component
the security of the system
models
T4.5 T4.5