P i C fid i l D Protecting Confidential Data on Personal Computers with S torage p g Capsules
Kevin Borders, Eric Vander Weele, Billy Lau, and Atul Prakash
P Protecting Confidential Data on i C fid i l D Personal - - PowerPoint PPT Presentation
P Protecting Confidential Data on i C fid i l D Personal Computers with S p torage g Capsules Kevin Borders, Eric Vander Weele, Billy Lau, and Atul Prakash Problem: Malicious S oftware Computing becomes pervasive, so is malware
Kevin Borders, Eric Vander Weele, Billy Lau, and Atul Prakash
▫ Over 23 million computers cleansed in 2008 [1]
Fi i l l ▫ Financial loss ▫ Identity theft ▫ Fraud ▫ Fraud
[1] Microsoft Security Intelligence Report Volume 5
▫ Perform financial analysis of credit card expenditure ▫ Writing journal containing controversial political beliefs beliefs ▫ Writing business proposal
Internet Provide confidentiality for local sensitive files against li i f malicious software
Documents
Applications
Need to verify all software prior to installation
Boot Loader Kernel
▫ Hard
Boot Loader BIOS
▫ Even harder!!
Internet Internet Internet
X X X X
M d t A C t l ith t i t t l
Mandatory Access Control A Mandatory Access Control B Air Gap
flow policy = Limited Usability
information from a compromised commodity OS information from a compromised commodity OS
access sensitive data access sensitive data
Norm al Mode Secure Mode Norm al Mode Secure Mode
Perform non sensitive
Edit sensitive documents
C l Capsules
Similar to TrueCrypt but contents safe when open Similar to TrueCrypt, but contents safe when open
Primary VM Capsule VM
Standard Programs Vi l D i Primary OS Standard OS Vi t l D i
s
Green = Trusted Computing Red = Not Trusted
Virtual Drivers
VMM
Virtual Drivers
Computing Base Not Trusted
Physical Device Drivers VMM OS Hardware
▫ The user, ▫ The capsule VM, and The capsule VM, and ▫ The VMM
▫ The primary OS ▫ Applications
▫ Channels within the primary VM are blocked Ch l i C l VM VMM d h d ▫ Channels in Capsule VM, VMM, and hardware may not be blocked
Primary VM Capsule VM
Capsule Viewer Capsule Server Vi l D i Primary OS Standard OS V ewe Vi t l D i Se ve Virtual Drivers
VMM
Virtual Drivers Capsule VMM Module Physical Device Drivers VMM OS Hardware
but we: but we:
▫ Fix the file store size ▫ Re-encrypt the store before every export Re encrypt the store before every export ▫ The user controls transition timing with a secure key escape sequence
ROM, USB, SCSI, etc.
D i i di bl d i d ▫ Device output is disabled in secure mode
layout, store information in virtual network y
▫ VMM does not over-commit memory and uses fixed layout ▫ Restart the virtual network during transition to ▫ Restart the virtual network during transition to normal mode
▫ Restoration code adds noise to CPU, full reset would completely clear CPU ▫ Would need to clear all disk caches or move all Would need to clear all disk caches or move all files to block disk covert channels
To be safe users are only required to:
▫ Remember that they are supposed to enter a key escape sequence (like ctrl+alt+del) to enter secure escape sequence (like ctrl+alt+del) to enter secure mode ▫ Heed warnings
9 10 300 90 100 300 4 5 6 7 8 Seconds 100 150 200 250 Seconds Snapshot Mount Capsule Disable 30 40 50 60 70 80 Seconds 100 150 200 250 Seconds Restore Reset VM Flush Disk 1 2 3 256 512 1024 VM M (MB) 50 100 256 512 1024 VM M (MB) Disable Netw ork 10 20 30 256 512 1024 VM Memory (MB) 50 100 256 512 1024 VM Memory (MB) VM Memory (MB) VM Memory (MB) VM Memory (MB) VM Memory (MB)
To Secure Mode To Normal Mode
w/ background snapshot w/ background snapshot w/o background snapshot w/o background snapshot
To Secure Mode To Normal Mode
350 400 450
s)
100 150 200 250 300
Time (seconds Remove Build Unpack
50 100 Native VM VM + TC Capsule
Configuration
▫ Storage Capsules 38% slower than native system Storage Capsules 38% slower than native system ▫ Only 5.1% slower than running TrueCrypt in VM
are lost are lost
▫ Background computations
Network connections are lost in secure mode
▫ Downloads, services, etc.
p transition time
for securing files on personal computers for securing files on personal computers
▫ Similar to existing file encryption software ▫ Provide better protection and usability Provide better protection and usability ▫ Works in the face of a compromised OS
▫ Explores covert channels on many layers