-
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
(Integrity Justified) Experimental Provenance
Patrick McDaniel, Pennsylvania State University Workshop on GENI and Security Davis, CA -- January 22, 2009
1
(Integrity Justified) Experimental Provenance Patrick McDaniel, - - PowerPoint PPT Presentation
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
Patrick McDaniel, Pennsylvania State University Workshop on GENI and Security Davis, CA -- January 22, 2009
1
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
Data often comes from many sources ... ... is synthesized/influenced by complex/hidden processes ... ... thus, how do you really know what the data means?
Who/what contributed to it? What was it based on? When was it generated? Why was it generated? How was it generated?
2
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
Detection, isolation, and recovery
Forensics, consistency, believability
Extension, instrumentation
Updates, correction, extension, refinement
Evidence that data is legitimate/legal (certification, verification)
3
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
What software was a component (slice/aggregate) running? What inputs and configuration were used? What security policy was being enforced?
Think about sensitive experiments: NCR-esque, proprietary
Determines apparatus acceptability of validation
4
Systems and Internet Infrastructure Security Laboratory (SIIS) Page
the instantaneous state of a system, but not its data, or over time, or for other computational elements (VMs)
components that uses that apparatus to attest to the system state, protection state, data, and environment.
... and tie a proof of that aggregate to experimental results.
5 Physical Platform 2
VM/OS
Physical Platform 1
VM/OS App VM Shamon Core Other Application VM App
...
Application VM
...
Shamon Connections
...
Shamon Core Untrusted Services Trusted Services Sys Untrusted Services Trusted Services App VM App Sys Client