Modern Systems: Security Outline Outline What Weve Been Talking - - PowerPoint PPT Presentation

modern systems security outline
SMART_READER_LITE
LIVE PREVIEW

Modern Systems: Security Outline Outline What Weve Been Talking - - PowerPoint PPT Presentation

Modern Systems: Security Outline Outline What Weve Been Talking About... Introduction What Weve Been Talking About... Introduction What are Security Risks? Introduction Todays Topic Introduction Two Systems


slide-1
SLIDE 1

Modern Systems: Security

slide-2
SLIDE 2

Outline

Outline

slide-3
SLIDE 3

Introduction

What We’ve Been Talking About...

○ ○

slide-4
SLIDE 4

Introduction

What We’ve Been Talking About...

○ ○

slide-5
SLIDE 5

Introduction

What are Security Risks?

slide-6
SLIDE 6

Introduction

Today’s Topic

slide-7
SLIDE 7

Introduction

Two Systems

Nexus Fabric

slide-8
SLIDE 8

Introduction

Two Systems

Nexus Fabric

slide-9
SLIDE 9

Outline

Outline

slide-10
SLIDE 10

Background

Trust Establishment

○ ○ ○

slide-11
SLIDE 11

Background

Authorization

principal: a user, group, system component, computer etc. that a security system trusts implicitly

slide-12
SLIDE 12

Outline

Outline

slide-13
SLIDE 13

OS approach to security, introduces logical attestation

Nexus [SOSP’11]

slide-14
SLIDE 14

Nexus

Overview

slide-15
SLIDE 15

Nexus

Trusted Platform Modules

slide-16
SLIDE 16

Nexus

The Problem with TPM

○ ○ ○

slide-17
SLIDE 17

Nexus

Credentials-Based Authorization

slide-18
SLIDE 18

Nexus

Logical Attestation

slide-19
SLIDE 19

Nexus

Logical Attestation cont.

slide-20
SLIDE 20

Nexus

Nexus OS

slide-21
SLIDE 21

Nexus

Implementation: Nexus OS

slide-22
SLIDE 22

Nexus

Implementing Logical Attestation Labels

slide-23
SLIDE 23

Nexus

Introspection & Interpositioning

slide-24
SLIDE 24

Nexus

Nexus OS

slide-25
SLIDE 25

Nexus

Applications

slide-26
SLIDE 26

Nexus

Case Example: Fauxbook

slide-27
SLIDE 27

Nexus

Evaluation Results

slide-28
SLIDE 28

Nexus

Evaluation Results

slide-29
SLIDE 29

Nexus

Evaluation Results

slide-30
SLIDE 30

Outline

Outline

slide-31
SLIDE 31

PL approach to secure distributed systems

Fabric [SOSP ‘09]

slide-32
SLIDE 32

Fabric

Overview

slide-33
SLIDE 33

Fabric

The Big Ideas

○ ○ ○ ○

slide-34
SLIDE 34

Fabric

What is Information Flow?

slide-35
SLIDE 35

Fabric

Fabric Architecture

slide-36
SLIDE 36

Fabric

Security Model: Principals

slide-37
SLIDE 37

Fabric

Security Model: Principals

slide-38
SLIDE 38

Fabric

Security Model: Labels

slide-39
SLIDE 39

Fabric

Security Model: Labels cont.

slide-40
SLIDE 40

Fabric

Security Model: Labels cont.

slide-41
SLIDE 41

Fabric

Applications

slide-42
SLIDE 42

Fabric

Evaluation Results

slide-43
SLIDE 43

Outline

Outline

slide-44
SLIDE 44

Today

What Happened….

Fabric Papers CSF’15, PLAS’14, POST’14, NSDI’14, PLDI’ 12, Oakland’12, CCS’11, CCS’10, Jed’s Thesis, SOSP’09

slide-45
SLIDE 45

Outline

Outline

slide-46
SLIDE 46

Conclusion

Two Approaches to Trustworthy Computing

slide-47
SLIDE 47

Conclusion

What should we trust?