modern systems security outline
play

Modern Systems: Security Outline Outline What Weve Been Talking - PowerPoint PPT Presentation

Modern Systems: Security Outline Outline What Weve Been Talking About... Introduction What Weve Been Talking About... Introduction What are Security Risks? Introduction Todays Topic Introduction Two Systems


  1. Modern Systems: Security

  2. Outline Outline

  3. What We’ve Been Talking About... ○ ○ Introduction

  4. What We’ve Been Talking About... ○ ○ Introduction

  5. What are Security Risks? Introduction

  6. Today’s Topic Introduction

  7. Two Systems Nexus Fabric Introduction

  8. Two Systems Nexus Fabric Introduction

  9. Outline Outline

  10. Trust Establishment ○ ○ ○ Background

  11. Authorization principal : a user, group, system component, computer etc. that a security Background system trusts implicitly

  12. Outline Outline

  13. Nexus [SOSP’11] OS approach to security, introduces logical attestation

  14. Overview Nexus

  15. Trusted Platform Modules Nexus

  16. The Problem with TPM ○ ○ ○ Nexus

  17. Credentials-Based Authorization ○ Nexus

  18. Logical Attestation ⇔ Nexus

  19. Logical Attestation cont. Nexus

  20. Nexus OS Nexus

  21. Implementation: Nexus OS Nexus

  22. Implementing Logical Attestation Labels Nexus

  23. Introspection & Interpositioning Nexus

  24. Nexus OS Nexus

  25. Applications Nexus

  26. Case Example: Fauxbook Nexus

  27. Evaluation Results Nexus

  28. Evaluation Results Nexus

  29. Evaluation Results Nexus

  30. Outline Outline

  31. Fabric [SOSP ‘09] PL approach to secure distributed systems

  32. Overview Fabric

  33. The Big Ideas ○ ○ ○ ○ Fabric

  34. What is Information Flow? Fabric

  35. Fabric Architecture Fabric

  36. Security Model: Principals Fabric

  37. Security Model: Principals Fabric

  38. Security Model: Labels Fabric

  39. Security Model: Labels cont. Fabric

  40. Security Model: Labels cont. Fabric

  41. Applications Fabric

  42. Evaluation Results Fabric

  43. Outline Outline

  44. What Happened…. ○ Fabric Papers CSF’15, PLAS’14, POST’14, NSDI’14, PLDI’ 12, Oakland’12, CCS’11, CCS’10, Jed’s Thesis, SOSP’09 Today

  45. Outline Outline

  46. Two Approaches to Trustworthy Computing Conclusion

  47. What should we trust? Conclusion

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend