Secure Xen on ARM: Status and Driver Domain Separation Sang-bum Suh - - PowerPoint PPT Presentation

secure xen on arm status and driver domain separation
SMART_READER_LITE
LIVE PREVIEW

Secure Xen on ARM: Status and Driver Domain Separation Sang-bum Suh - - PowerPoint PPT Presentation

Secure Xen on ARM: Status and Driver Domain Separation Sang-bum Suh sbuk.suh@samsung.com SW Laboratories Corporate Technology Operations Samsung Electronics Presented at Xen Summit Autumn 2007, Sun Microsystems Contributors Sang-bum Suh


slide-1
SLIDE 1

Secure Xen on ARM: Status and Driver Domain Separation

Sang-bum Suh sbuk.suh@samsung.com SW Laboratories Corporate Technology Operations Samsung Electronics Presented at Xen Summit Autumn 2007, Sun Microsystems

slide-2
SLIDE 2

2/21 SW Laboratories, CTO, Samsung Electronics

Contributors

Sang-bum Suh Sung-min Lee Joo-young Hwang Jung-hyun Yu Sangdok Mo Chanju Park Bokdeuk Jeong Sungkwan Heo Jaemin Ryu Jun-young Sim Dong-hyuk Lee Igor Nabirushkin Alexander Trofimov Mikhail Levin Il-pyung Park Ho-soo Lee

slide-3
SLIDE 3

3/21 SW Laboratories, CTO, Samsung Electronics

Contents

Overview and Status of Secure Xen on ARM Architecture 1.0

Requirements for Beyond 3G Mobile Phone Goal and Architecture Development Environments Status of Secure Xen on ARM Architecture 1.0

Driver Domain Separation: Architecture Exploration

Motivation Driver Domain Separation: Architecture Summary Performance

Future Work

slide-4
SLIDE 4

4/21 SW Laboratories, CTO, Samsung Electronics

Overview and Status of Secure Xen on ARM Architecture 1.0

slide-5
SLIDE 5

5/21 SW Laboratories, CTO, Samsung Electronics

Requirements for Beyond 3G Mobile Phone

  • End user: Secure and reliable mobile terminals for mobile Internet services using WiBro
  • Manufacturer: Robustness though complexity of devices gets increased
  • Contents provider: Protection of IP rights in end-user terminals
  • Carrier companies: Open and Secure Mobile Platform
  • OSTI (Open Secure Terminal Initiative): NTT DoCoMo, Intel

Expected Beyond 3G Environments

m-Commerce m-Commerce Downloadable Application Downloadable Application

I nternet/ Cellular I ntegration

Needs

Security, Reliability

(Secure Terminal)

Robustness, Time-to-market

VoIP VoIP

  • Apps. & Services

CPU > 500 MIPS CPU > 500 MIPS Memory > 64MB Memory > 64MB High-speed

(10~ 100Mbps),

Multi-mode Modem High-speed

(10~ 100Mbps),

Multi-mode Modem

User Manufacturer

U-Health U-Health Web Browsing Web Browsing Internet Banking Internet Banking Multimedia Service Multimedia Service Mobile 3D Game Mobile 3D Game Component Reusability Component Reusability

System

Multi- function Multi- function

System Complexity

Beyond 3G environments and Needs

slide-6
SLIDE 6

6/21 SW Laboratories, CTO, Samsung Electronics

Secure Xen on ARM Architecture 1.0

Application Application Application Application

CPU CPU

Application Application Application Application

VM Interface VM Interface VM Interface VM Interface Peripheral Devices Peripheral Devices Peripheral Devices Peripheral Devices Back-end Drivers Back-end Drivers Front-end Drivers Front-end Drivers Native Drivers Native Drivers

Resource Resource Allocator Allocator Domain Manager Domain Manager Access Control Access Control

System Memory System Memory Flash Memory Flash Memory

Dom 0 Dom 0 Dom U Dom U

Application Application Access Access Control Control Access Access Control Control

Goal

Light-weight secure virtualization technology for beyond 3G mobile phone

Approach

Design and implementation of

VMM on ARM using Xen architecture: Xen on ARM Security features using Xen on ARM:

secure boot, secure SW installation, multi-layer fine-grained access control

Goal and Architecture

slide-7
SLIDE 7

7/21 SW Laboratories, CTO, Samsung Electronics

Development Environments

HW and SW Environments

A Reference System for Implementation SW – Xen : Xen-3.0.2 – Linux : ARM Linux-2.6.11 – GUI : Qtopia HW – Processor : ARM-9 266Mhz (Freescale i.MX21) – Memory : 64MB – Flash : NOR 32MB / NAND 64MB – LCD : 3.5 inch – Network : CS8900A 10Base-T Ethernet Controller Development Environments

OS : Fedora Core 6 Cross-compiler: Montavista ARM GCC 3.3.1 Debugger : Trace32 ICD (In Circuit Debugger)

slide-8
SLIDE 8

8/21 SW Laboratories, CTO, Samsung Electronics

Status of Secure Xen on ARM Architecture 1.0

Xen on ARM:

Performance improved Video demo: game on Dom 0 and application/Qtopia on Dom U

Xen Security features:

5 access control modules and visualization supported: Type Enforcement, Samsung proprietary, BiBA, Bell LaPadula, Chinese wall GUI-based access control policy manager Video demo: access control mechanism against phishing attack

Driver domain separation: architecture exploration

page21 video1

slide-9
SLIDE 9

9/21 SW Laboratories, CTO, Samsung Electronics

Driver Domain Separation: Architecture Exploration

slide-10
SLIDE 10

10/21 SW Laboratories, CTO, Samsung Electronics

Motivation

Many downloadable services under beyond 3G mobile environments will be increased.

This requires an open mobile platform.

Open platform will face problems with malware and bugs similar to PC.

Secure Xen can help an open mobile platform secure against malware. However, bugs in device drivers may cause Dom 0 to stop working and the applications to have to restart. Relatively short life cycle of peripheral chips in consumer electronics products. – Can test cases be updated quickly and be used to detect every bug during development ? Patch is likely.

☞ Device driver domain to be separated from Dom 0 (security applications running on Dom 0 in secure Xen on ARM) kernel.

slide-11
SLIDE 11

11/21 SW Laboratories, CTO, Samsung Electronics

Driver Domain Separation: Architecture

Backend Driver Native Driver Hardware App

Dom 0 Device Driver Domain

Shared page Event channel Frontend Driver

Dom U

Frontend Driver Shared page Event channel Xenbus Xen on ARM App App App

slide-12
SLIDE 12

12/21 SW Laboratories, CTO, Samsung Electronics

Summary

Device driver domain

Xen-Linux kernel, access control module, backend and native drivers Modification RAMFS used for driver domain during booting Xenbus, Xenstore, and Xen tools modified Booting procedure modified – Booting Dom 0 => creating Device Driver Domain => initializing split device driver

Advantage

Service availability can be improved even under driver fault Dom0 and Dom U can work, while due to device driver failure, driver domain has to be restarting.

Disadvantage

Performance degradation due to domain switching between Driver Domain and Dom 0

slide-13
SLIDE 13

13/21 SW Laboratories, CTO, Samsung Electronics

Performance (1/2)

Environments

Virtual Network HW Platform: Freescale i.MX21 266Mhz ARM926lrmsdmq Memory: 64MB DDR Network: CS8900A 10Base-T Ethernet Controller

Hardware Hardware Dom 0 Dom 0 Frontend Frontend driver driver Driver Driver domain domain Backend driver Dom 1 Dom 1 Frontend Frontend driver driver Test S/W Test S/W Hardware Hardware Backend driver Dom 1 Dom 1 Frontend Frontend driver driver Test S/W Test S/W Dom 0 Dom 0

Backend in dom0

Xen Xen Dom0 Dom0 Dom1 Dom1 44 44MB MB Driver Driver domain domain 20 20MB MB

Backend in driver domain System memory configuration

Xen Xen Dom0 Dom0 Dom1 Dom1 44 44MB MB 20 20MB MB * Driver domain and Dom1 use Ramfs as a root file system.

slide-14
SLIDE 14

14/21 SW Laboratories, CTO, Samsung Electronics

Performance (2/2)

Network Test: Netperf BMT

Due to a problem with DMA of the HW, performance is degraded further.

* TCP_STREAM: Measuring a bulk data transfer throughput * Native Linux: network driver in native Linux * BE in Dom0: Backend driver in Dom0 * BE in DomD: Backend driver in drive domain * RH: Remote Host

TCP_STREAM 8.86 8.26 6.31 1 2 3 4 5 6 7 8 9 10 RH -> Target M bits/se c Native Linux BE in Dom0 BE in DomD

slide-15
SLIDE 15

15/21 SW Laboratories, CTO, Samsung Electronics

Future Work

Performance improvement of driver domain separation Minimal OS kernel for driver domain State migration

slide-16
SLIDE 16

16/21 SW Laboratories, CTO, Samsung Electronics

Thank you for attention

slide-17
SLIDE 17

Appendix

slide-18
SLIDE 18

18/21 SW Laboratories, CTO, Samsung Electronics

Access Control Module (1/2)

Supporting 5 access control models

Type Enforcement A classical access control model which can be enforced for comprehensive system resources protection Physical/virtual resources access control Proprietary Protecting a mobile device from resource drain attacks (e.g., CPU, memory, battery) Bell LaPadula Confidentiality model Virtual resources access control where there are many domains (Good for controlling information flow with security level) Biba Integrity model Virtual resources access control where there are many domains (Good for controlling information flow with security level) Chinese Wall Preventing simultaneous execution of multiple domains where the domains have different interests (i.e., assigned to conflict set)

slide-19
SLIDE 19

19/21 SW Laboratories, CTO, Samsung Electronics

Access Control Module (2/2)

GUI-based policy manager

Edits XML-based access control policies Sets new access control policies dynamically

Example of the XML-based TE policy

slide-20
SLIDE 20

20/21 SW Laboratories, CTO, Samsung Electronics

Secure SW Installation

Basic assumptions about software on the secure domain

A small set of software (not much) can be installed by only trusted parties (i.e., manufacturer or service providers verified by the manufacturer) The trusted parties must rigorously test the software based on advanced quality assurance methodology during the development phase

Secure SW installer installs only software digitally signed by a manufacturer Access control at the secure domain (Dom0) allows only authentic secure SW installer to create executable files on the domain

Even in case a device owner downloads or creates files on the secure domain, they cannot be executed

slide-21
SLIDE 21

21/21 SW Laboratories, CTO, Samsung Electronics

Demonstration Scenario

Connecting to a phishing site

  • Alice connects to a phishing server with her mobile phone after receiving an email fraudulently

saying launch of UCC services from her favorite web site

  • She downloads and installs malware masqueraded as genuine SW from that site

With a conventional single OS-based mobile phone

  • Malware corrupts kernel and sends her sensitive information to an attacker while she is using

the Internet banking service

With a secure Xen-based mobile phone (with secure domain and normal domain)

  • Even in case malware corrupts kernel of the normal domain, there is no information leakage or

availability threat owing to domain separation and mandatory access control

  • Secure SW installer installs Gifviewer signed by a manufacturer successfully but fails to install

Pacman whose digital signature is invalid

Assumption: communication channel between the secure SW installer and manufacturer site which provides downloadable SW is encrypted

video2 video3