first year review project overview

22
First Year Review Project Overview Trento - September 24th, 2007 Prof. Yoram Ofek

Upload: others

Post on 03-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: First Year Review Project Overview

First Year Review

Project Overview

Trento - September 24th, 2007

Prof. Yoram Ofek

Page 2: First Year Review Project Overview

2

Computing/Networking Convergence

• Exponential growth in computing/networking

• Leads to unifying: computing/networking

• All machines are interconnected

• Ensuring that applications are TRUSTED is critical [Operating as specified]

• Avoiding manipulation of programs/protocols

• STEALING content and information

• DENIAL of service – TCP example

• FAIR on-line bidding/trading/gaming

• … … …

Page 3: First Year Review Project Overview

3

Remote Entrusting: Design Objective

• How a remote code (SW application) on a

1st untrusted machine

can be entrusted by a

• 2nd entrusting machine?”[albeit running inside an untrusted environment]

• I.e., Distribution of trust

or entrusting

Page 4: First Year Review Project Overview

4

���������

�� �����������������

���������� ����������������

�������������������

• 1st Untrusted machine emanates Secure Tags

from a code/software during execution

• 2nd Entrusting Machine is ENTRUSTING the

• 1st Untrusted machine by verifying the Secure Tags

��������������������������������������

Core of Trust

Page 5: First Year Review Project Overview

5

Informal Definition of Trust

for Remote Entrusting

•• A software is deemed authentic/trustedA software is deemed authentic/trusted

if and only if its functionality if and only if its functionality

has not been altered/tampered by an has not been altered/tampered by an

untrusted/unauthorized entityuntrusted/unauthorized entity

prior to or during executionprior to or during execution

Page 6: First Year Review Project Overview

6

Scope of Trust in RE-TRUST

Human-to-Human

Machine-to-MachineRemote Entrusting:

RemoteSW Authentication

In Run-time

• Trust necessary condition: some sort of “identity”

Signature/attestation/authentication

of SW & HW in run-time

•• { Informally: avoidance of the { Informally: avoidance of the ””manman--atat--thethe--

endend”” attack [i.e., the untrusted user] } attack [i.e., the untrusted user] }

Page 7: First Year Review Project Overview

7

Challenges of the Basic Approach1.1. Combining/interlocking of two programsCombining/interlocking of two programs

• 1. Functional code to be entrusted

• 2. Secret (code, parameters-keys) –for secure tag generator

2.2. Tamper resistance (TR) of the aboveTamper resistance (TR) of the aboveVarious methods – “lines of defense”:

• TR in SW only

• Replacement

• TR in SW/HW (e.g., TC, smart card)

Page 8: First Year Review Project Overview

8

Quality of Remote Entrusting

SW and SW/HW Methods[Frequency and RE Complexity]

Method 2: SWComponents/Parameters

Replacement

(increased frequency)

Method 1: SWTamper-resistance (TR) Quality

(increased reverse engineering (RE) complexity)

Improved Security & TrustImproved Security & Trustis Measured by IncreasedDistance from the Origin

Method 3: SW/HW [e.g., USB Smart Card]Tamper-resistance (TR) Quality

(increased reverse engineering (RE) complexity)

Page 9: First Year Review Project Overview

9

Some Current Approaches

1. Sending packetsBased on monitoring & diagnosticsreactive (after the fact)

• Firewall monitoring

• SLA (service level agreement) policing

2. Receiving packets (e.g., content)Based on adding special HW

• E.g., TC/NGSCB, “watch-dogs,” …

• Specific to each computer HW depends on configuration, architecture, …

• What to do with current systems?

Page 10: First Year Review Project Overview

10

TCG Architecture

• Trusted Platform Module (TPM)The set of functions and data that are common to all types of platform, which must be trustworthy if the Subsystem is to be trustworthy; a logical definition in terms of protected capabilities and shielded locations.

CPU

RAM

Controller

Display

Boot ROM

TPM

DevicesEmbedded

RemovableDevices

Reference PC Platform containing TCG TPM

Tamper ProofComputing Device

CPU exec boot TCG ROMTPM is not snooping –but respond to requests

Page 11: First Year Review Project Overview

11

TCG: TPM Architecture

Communications

Non−Volatile

Storage

Platform

Configuration

Register (PCR)

Attestation

Identity

Key (AIK)

Program

Code

I/O

RSA

Engine Opt−InExec

Engine

Key

GenerationSHA−1

Engine

Random

Number

Generator

Trusted Platform Module (TPM)

TPM Component Architecture

PCR stores hash of measurementvalues but is not visible outside TPMWhile “chaining” measurements

Page 12: First Year Review Project Overview

12

TCG: Transitive Trust

Application Code

OS Code

OS Loader Code

CRTM

TBB + Roots of Trust

1

3

5

2

4

6

Execution Flow

Measurement Flow

Transitive Trust applied to Boot from Static Root of Trust

Primary Objective:Application Trust

TBB - trusted buildin blockCRTM - core root of trust for measurementsNote:OS etc. updates should be known to the verifier--- open-source? --- customization?For apps "big brother" on "mother board“?Consequently - closed computing system?

- users cannot do what they want?!

Page 13: First Year Review Project Overview

13

TCG: Integrity Reporting• RTR – root of trust reporting has two functions

1. expose shielded locations for storage of integrity measurements2. attest to the authenticity of stored values based on trusted platform identities

1. RequestPlatformConfiguration( )

2. GetEventLog( )

3. GetSignedPCR( )

4. SignPCRValue( )

5. GetPlatformCredentials( )

PlatformConfiguration( )

6. ValidatePlatformCredentials( )

SignedPCR( )

ChallengerPlatform

Agent TPM Repository

Attestation Protocol and Message Exchange

Credentials: certificate that are built in the machine e.g., processor ID, TPM ID,

EK public key –endorsement key for generating attestation keys

“TrustedChecker”

Non Run-time “Secure-TagGenerator”

Attestation: provides signaturesto the challenger "like" remote entrusting

Page 14: First Year Review Project Overview

14

TC vs. RE-TRUST• Core of trust

• TC: local

• RE-TRUST: remote

• Run-time

• TC: no

• RE-TRUST: yes

• Scope of entrusting

• TC: bottom - up

• RE-TRUST: selected applications

• Trust authority

• TC: external (TPM is based on public-key)

• “Big-brother” on the motherboard!?

• RE-TRUST: none / mutual agreement

Page 15: First Year Review Project Overview

15

Trusted Tag

Checker (TC)

Untrusted Computing

Environment

TrustedFlow

Generator (TG)

Handheld/Wireless Device

Trusted Tag

Checker (TC)

TrustedFlow

Generator (TG)

Untrusted Computing

Environment

Handheld/Wireless Device Network Interface

������������ �������������������

���������

���������

��������

��������

Page 16: First Year Review Project Overview

16

TG

TG

TG

TG

TGTG

TGTG

TC

TC TC

TC

Entrusting

Entrusting Entrusting

Entrusting

TC

“Castle”

“HARDENED”with SpecialHardware/Software(e.g., TCPA)

�������������!������ �������������������

���������

��������� ���������

Page 17: First Year Review Project Overview

17

Selected Scientific and Technical Challenges

1. SW-based – Tamper-resistance quality

• Combining two programs: original together with tag generator into “secure SW module”.

• Protecting the secure SW so it is hard to separate by increased program cohesiveness.

• Hiding the semantic of the secure SW module by means of obfuscation, for example.

• Measuring the complexity of reverse engineering of the secure SW module.

2. SW-based – Dynamic replacement

• Replacement of SW component in run-time is different from the current operating system (OS) paradigm.

• Replacement of SW component while resisting tampering by the OS is a new challenge.

• Analyzing trade-off between dynamic replacement frequency and tamper-resistance quality.

3. HW/SW-based – Tamper-resistance and encryption quality

• Tamper-resistant co-design of applications with software and hardware components.

• Analyzing trade-off between hardware and software.

• The security of communication between the secure SW module and the HW component.

Page 18: First Year Review Project Overview

18

Work Plan Organization

WP1: Overall Architecture

WP2: SW-basedTR Method 1 & 2

WP3: HW/SW-basedTR Method 3

WP4: Security/Trust Analysis

Optional (analysis dependent):- Proof-of-concepts (PoC) – WP2/WP3 - Standardization – WP1 - Solution definitions / technology transfer – WP1

Analysis

Analysis Analysis

Analysis

Analysis

Page 19: First Year Review Project Overview

19

Work-planning and timetable – Gantt0 3 6 9 12 15 18 21 24 27 30 33 36

WP0 - Management and Coordination

T0.1 Management activities

T0.2 Risk management activitiesT0.3 Scientific/industrial advisory board activities

WP1 - Architectural Framework

T1.1 – Trust requirements, generic applications

T1.2 – SW-based initial architectural framework

T1.3 – HW/SW-based initial architectural framework

T1.4 – SW-based reference architecture designT1.5 – HW/SW-based reference architecture design

WP2- SW-based Tamper Resistance

T2.1 – Trust model

T2.2 – Secure interlocking and authenticity checking

T2.3 – Dynamic replacement

T2.4 – Increased reverse engineering complexity

T2.5 – Design of entrusting protocol T2.6 – Proof of concept

WP3 - HW/SW-based Tamper Resistance

T3.1 – Trust model

T3.2 – Hardware/Software co-obfuscation

T3.3 – Encrypted code execution

T3.4 – Observable cryptography T3.5 – Scalability and performance

WP4 - Trust and Security Analysis

T4.1 – Trust analysis of SW-based method

T4.2 – Trust analysis of HW/SW-based method

T4.3 – Reverse engineering complexity

T4.4 – Comparative analysis with trusted computingT4.5 – Remote entrusting and Internet secure protocols

WP5 - Dissemination

T5.1 – Project oriented dissemination activities T5.2 – Scientific oriented dissemination activities

Page 20: First Year Review Project Overview

20

Initial architecture

WP1-Phase 1

DesignWP2/WP3

Analysis &Evaluation

WP4

Reference architecture

WP1-Phase 2

T1.2

SW-based

initial arch

T4.1- T43

Analysis of

SW-based method

and reverse

engineering

complexity

Task

Logicaldependency

T1.3

HW/SW-based

initial arch

Task1.4

SW-based

reference arch

Task1.5

HW/SW-based

reference arch

T4.2

Analysis of

HW/SW-based

method

T2.2- T2.3

Interlocking,

authenticity,

replacement

T2.4

Resistance to

reverse

engineering

T3.2

HW/SW

co-obfuscation

T3.3 – T3.4

Encrypted

code execution,

observable

cryptography

Page 21: First Year Review Project Overview

21

Work Package List

310TOTAL

536118P1

Dissemination,

Exploitation,

Standardization

WP 5

836175P1Trust and Security

AnalysisWP 4

536172P4HW/SW-based Tamper

Resistance MethodWP 3

736195P2SW-based Tamper

Resistance MethodsWP 2

536136P1Architectural

FrameworkWP1

636114P1Management and

CoordinationWP0

Delivera

ble

No.

End

month

Start

month

Person-

months

Lead

contractorWorkpackage titleNo.

Page 22: First Year Review Project Overview

22

Scientific/Industry Advisory Board

• Internationally renown experts in both academia and industry:

• Christian Collberg (University of Arizona)

• Amir Herzberg (Bar Ilan University, Israel)

• Willem Jonker (Philips Research)

• David Naccache (University Paris II)

• Bart Preneel (Katholieke Universiteit Leuven)

• Paolo Prinetto (Politecnico di Torino)

• Paul Van Oorschot (Carleton University, Canada)

• Moti Yung (Columbia University, USA)