petros maniatis devdatta akhawe kevin fall elaine shi
play

Petros Maniatis , Devdatta Akhawe, Kevin Fall, Elaine Shi, Stephen - PowerPoint PPT Presentation

Petros Maniatis , Devdatta Akhawe, Kevin Fall, Elaine Shi, Stephen McCamant, Dawn Song Secure Data Capsules @ HotOS2011 3 Secure Data Capsules @ HotOS2011 4 Secure Data Capsules @ HotOS2011 5 Secure Data Capsules @ HotOS2011 6 Secure Data


  1. Petros Maniatis , Devdatta Akhawe, Kevin Fall, Elaine Shi, Stephen McCamant, Dawn Song

  2. Secure Data Capsules @ HotOS2011 3

  3. Secure Data Capsules @ HotOS2011 4

  4. Secure Data Capsules @ HotOS2011 5

  5. Secure Data Capsules @ HotOS2011 6

  6. Secure Data Capsules @ HotOS2011 7

  7. • Diverse modes of data use and storage outside owner’s control • Distinct organizations, infrastructures, jurisdictions • Unknown software, maintenance, trustworthiness • Deep, continuous, critical sharing Today: trust everyone to do anything undetected, or die Secure Data Capsules @ HotOS2011 9

  8. • Owner sets data policy: Data Use Controls (DUCs) • Policy enforced on data while out-of-custody • Data provenance maintained through all change 1. Support current OSes and applications without limiting choice 2. Remove OS, applications from the TCB, verify 3. Provide good performance Legacy is the Killer App Secure Data Capsules @ HotOS2011 10

  9. Secure Data Capsules @ HotOS2011 12

  10. Unmodified OS Application HW Secure Data Capsules @ HotOS2011 13

  11. Trusted Unmodified OS Application HyperVisor HW HRoT/TPM Secure Data Capsules @ HotOS2011 14

  12. Trusted Unmodified OS SEE System Application Interposer Taint Tracker HyperVisor HW HRoT/TPM Secure Data Capsules @ HotOS2011 16

  13. Trusted Unmodified OS SEE DUC Engine System Application Interposer Taint Auth DUC Tracker Provenance HyperVisor HW HRoT/TPM Secure Data Capsules @ HotOS2011 18

  14. Secure Data Capsules @ HotOS2011 19

  15. Petros’s Foot MRI • Mass here, mass there DUC • Dr. Magneto can edit • Dr. Ken can view Provenance • Nurse Jackie Created Secure Data Capsules @ HotOS2011 21

  16. Petros’s Foot MRI • Mass here, mass there DUC • Dr. Magneto can edit • Dr. Ken can view Provenance • Nurse Jackie Created • Dr. Magneto appended text, cropped image Secure Data Capsules @ HotOS2011 22

  17. Trusted Unmodified OS Unmodified OS SEE DUC Engine Application System Application Release Interposer Launch Secure Keys Auth Taint DUC Tracker Launch Secure Provenance HyperVisor HW HRoT/TPM Secure Data Capsules @ HotOS2011 23

  18. Trusted Unmodified OS SEE DUC Engine Application System Interposer Auth Taint DUC Tracker Provenance HyperVisor HW HRoT/TPM Secure Data Capsules @ HotOS2011 24

  19. Trusted Unmodified OS My photo SEE Tainted DUC Engine Before Before After ADD Application MUL MOV JMP Auth … … Secure Data Capsules @ HotOS2011 25

  20. Trusted Unmodified OS DUC Released Provenance Sandbox Intercept Release DUC Engine MRI Intercepted Taint Cropped Application Taint Other Obj Auth No taint X-Ray Taint Secure Data Capsules @ HotOS2011 26

  21. • Flow tracking does much of the heavy lifting, slooooowly • Might improve with: Restriction, Granularity, Asynchrony, Hardware • How to keep as little as possible of policy evaluation and flow tracking in TCB? Why T, CB? Prove it, please! • Are DUCs meaningful to humans? Composable? App-specific? • Covert channels a serious threat with untrusted applications • A tussle between flexibility – leak-ability, what can we do in between? • Aggregation/analytics? Secure Data Capsules @ HotOS2011 28

  22. Thank You! Secure Data Capsules @ HotOS2011 29

  23. • Ampoules • Cocoons • Caplets • Sheaths • Flasks • Husks • Pods • Bob Secure Data Capsules @ HotOS2011 30

  24. • The Enterprise Rights Management approach • Everyone uses same SW platform, applications • Like begging for non-compliance • Tough across organization/jurisdiction boundaries • Decentralized Information Flow Control • New OSes: small TCB but incompatible (e.g., HiStar), or compatible but large TCB (e.g., Flume) • New languages (e.g., Jif): rewrite applications, no protection at OS custody • Red/Green models: Trust application, disallow sharing, coarse granularity Secure Data Capsules @ HotOS2011 31

  25. • Sandboxes can have variable semantic richness 1. Know nothing of semantics • Act as a data sink, block all output except display • Storage Capsules [Borders2008] 2. Understand information flow • Allow output of data, sharing across apps • Must track flow of sensitive bits to outputs (DIFT) 3. Understand application or data semantics • Need trusted enforcers for app-specific policy • For now, targeting #2 with support for #3 Secure Data Capsules @ HotOS2011 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend