Modern Systems: Security Outline Outline What Weve Been Talking - - PowerPoint PPT Presentation
Modern Systems: Security Outline Outline What Weve Been Talking - - PowerPoint PPT Presentation
Modern Systems: Security Outline Outline What Weve Been Talking About... Introduction What Weve Been Talking About... Introduction What are Security Risks? Introduction Todays Topic Introduction Two Systems
Outline
Outline
Introduction
What We’ve Been Talking About...
○ ○
Introduction
What We’ve Been Talking About...
○ ○
Introduction
What are Security Risks?
Introduction
Today’s Topic
Introduction
Two Systems
Nexus Fabric
Introduction
Two Systems
Nexus Fabric
Outline
Outline
Background
Trust Establishment
○ ○ ○
Background
Authorization
principal: a user, group, system component, computer etc. that a security system trusts implicitly
Outline
Outline
OS approach to security, introduces logical attestation
Nexus [SOSP’11]
Nexus
Overview
Nexus
Trusted Platform Modules
Nexus
The Problem with TPM
○ ○ ○
Nexus
Credentials-Based Authorization
○
Nexus
Logical Attestation
⇔
Nexus
Logical Attestation cont.
Nexus
Nexus OS
Nexus
Implementation: Nexus OS
Nexus
Implementing Logical Attestation Labels
Nexus
Introspection & Interpositioning
Nexus
Nexus OS
Nexus
Applications
Nexus
Case Example: Fauxbook
Nexus
Evaluation Results
Nexus
Evaluation Results
Nexus
Evaluation Results
Outline
Outline
PL approach to secure distributed systems
Fabric [SOSP ‘09]
Fabric
Overview
Fabric
The Big Ideas
○ ○ ○ ○
Fabric
What is Information Flow?
Fabric
Fabric Architecture
Fabric
Security Model: Principals
Fabric
Security Model: Principals
Fabric
Security Model: Labels
Fabric
Security Model: Labels cont.
Fabric
Security Model: Labels cont.
Fabric
Applications
Fabric
Evaluation Results
Outline
Outline
Today
What Happened….
○
Fabric Papers CSF’15, PLAS’14, POST’14, NSDI’14, PLDI’ 12, Oakland’12, CCS’11, CCS’10, Jed’s Thesis, SOSP’09
Outline
Outline
Conclusion
Two Approaches to Trustworthy Computing
Conclusion