trusted component deployment
play

Trusted Component Deployment Trusted Components Bernd Schoeller - PowerPoint PPT Presentation

Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th , 2006 Code from the Web Can I trust the software on my machine, knowing that there are very bad people out there ? risk of malicious code risk of


  1. Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th , 2006

  2. Code from the Web ➢ Can I trust the software on my machine, knowing that there are “very bad people” out there ? ● risk of malicious code ● risk of insecure code ● risk of misbehaving code

  3. Overview ➢ Cryptographic crash course ➢ Component deployment technologies ● signed binaries ● public key infrastructure ● trusted computing ● processes and virtual machines ➢ Next week: proof-carrying code

  4. Cryptographic Crash Course ➢ Encryption / Decryption xrundctba Hello World Hello World asjfijas43

  5. Cryptographic Crash Course ➢ Symmetric Encryption xrundctba Hello World Hello World asjfijas43 = “shared secret”

  6. Cryptographic Crash Course ➢ Asymmetric Encryption xrundctba Hello World Hello World asjfijas43 = “private key” = “public key” + = “key pair”

  7. Hash Function Hello World 4711 = “hash function” 4711 = “hash value” Hallo World 0815

  8. Digital Signatures (very short) 4711 Hello World 4654 4711 Hello World 4654 equal ? 4711 4654

  9. Using Hash Values for Trust

  10. Using Hash Values for Trust

  11. Using Hash Values for Trust Bad guy TM

  12. “Man in the Middle” Attack Request hash value for X Request hash value for X The hash value for X is H The hash value for X is H' Bad guy TM

  13. Signed Binaries ➢ A signed binary can be authenticated to come from a certain source ● trust developer, but not deployment channel ● safe for “man in the middle” attack ● automatic check ● liability and damages

  14. The Next Problem ➢ How do we get the public keys to the users ?

  15. PKI ➢ “Public Key Infrastructure”: an global or local arrangement that provides the vetting of, and the vouching for user identities and the connected distribution of public keys. ➢ Types of PKI ● Hierarchical ● Distributed

  16. CAs: VeriSign, BSI Hierarchical PKIs Central Authority signs the public keys of Key Issuer Key Issuer Key Issuer signs the public keys of signs the public keys of signs the public keys of

  17. Distributed PKIs ➢ “Chain of Trust” ● all participants of a security network start to sign each others keys ● a key is officially seen as valid if ● signed by myself ● signed by “enough” other key holders, which are trusted by myself

  18. PGP “Web of Trust” ➢ Levels of trust ● untrusted: signatures with this key are ignored ● marginal: 2 signatures make a key valid ● complete/unlimited: signatures with this key make a key valid

  19. APT Secure ➢ APT is the standard package distribution tool of the Debian linux distribution ➢ Packages can be distributed world-wide ➢ User are encouraged to use a local package server with good connectivity ➢ Authenticity of packages automatically validated with digital signatures

  20. APT Secure (cont.) Packages Packages Software Release 3476 Release Debian Developer Packages Software Release 3476 User Maintainer

  21. Trusted Computing ➢ Definition I: ➢ Definition II: System that lets the System that lets the user verify/control the manufacturer Not part of this lecture software that he is verify/control the running on his software that the user machine is running on his machine

  22. Trusted Computing (cont.) ➢ Integrate a chip into computers that can ● supervise the boot process ● safely store (write only) keys ● verify signatures of code before execution ➢ Integrated into many IBM Thinkpad notebooks ➢ Driver available for Linux (tpm) ● Part of Linux Kernel 2.6.12-rc2 or later

  23. Untrusted Execution ➢ Can we execute code that we do not trust ? ● separate the code execution from the rest of the system ● control access to resources (CPU, memory, IO) ● support the user in assessing computational results

  24. Assessing Computational Results Am I trustworthy?

  25. UNIX Processes ➢ Traditional system separation ● code execution is associated with a user account ● control hardware resources (ulimit) ● IO access controlled by “user mode” ● CPU resource controlled by scheduler ● memory access controlled by MMU

  26. Virtual Machines ➢ Hardware support not needed ● Code JIT compiled or interpreted ➢ Byte-code allows static analysis ➢ Code verification at load time ● verified code can disable monitoring ➢ JIT compiler can integrate run-time checks ➢ Fine-grained verification

  27. Examples of Virtual Machines ➢ JVM, .NET ➢ JavaScript ➢ Postscript ➢ Online Games: Quake, UT, Doom, Half-Life

  28. Summary ➢ We have to be careful about the code that is executed on our machines ● There are many reasons not to trust code that others give you ● Dynamic systems require complex deployment and verification mechanisms

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend