secure endpoints, secure network: bios integrity measurements heuristics tool

15
Secure Endpoints, Secure Network BIOS Integrity Measurements Heuristics Tool for CFT Dan Griffin JW Secure, Inc.

Upload: dan-griffin

Post on 13-Jul-2015

208 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Secure Endpoints, Secure

Network

BIOS Integrity Measurements

Heuristics Tool for CFT

Dan Griffin

JW Secure, Inc.

Page 2: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

WWNSAD?

• NSA and NIST have been public about:

– Inevitability of mobile computing

– Need to support cloud-based services

– Even for use with secret data in the field

• What works for them can work for you

Page 3: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 4: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 5: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 6: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 7: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 8: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Introduction

• What is a TPM?

• What is “measured boot”?

• What is “remote attestation”?

Page 9: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Measured Boot + Remote

Attestation

Page 10: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

What is measured boot?

TPM

BIOS

Boot

Loader

Kernel

Early

Drivers

Hash of next item(s)

Boot Log

[PCR data]

[AIK pub]

[Signature]

Page 11: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

What is remote attestation?

Client Device

TPM

Signed

Boot

Log Attestation

Server

some token…

Page 12: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Weaknesses

• Provisioning

– Secure supply chain?

– TPM EK database

– Patching delay & whitelist maintenance

• Integrity of the TPM hardware

– Capping; electron microscopes

– Trend of migration from hardware to firmware

• Hibernate file is unprotected

Page 13: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Post-CFT

• Measurement-Bound Keys

– “Trusted Tamperproof Time on Mobile

Devices”

– See http://www.jwsecure.com/dan

• Commercialization

– JW Secure StrongNet

– RSA 2013

Page 14: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool
Page 15: Secure Endpoints, Secure Network: BIOS Integrity Measurements Heuristics Tool

Questions?

[email protected]

206-683-6551

@JWSdan

JW Secure provides custom security

software development services.