VTPM: Virtualizing The Trusted Platform Module

2y ago
42 Views
4 Downloads
2.39 MB
19 Pages
Last View : 4d ago
Last Download : 3m ago
Upload by : Adele Mcdaniel
Transcription

Systems and InternetInfrastructure SecurityNetwork and Security Research CenterDepartment of Computer Science and EngineeringPennsylvania State University, University Park PAvTPM: Virtualizing theTrusted Platform ModuleJoshua SchiffmanSystems and Internet Infrastructure Security (SIIS) LaboratoryPage1

It could happen to you Computers offer no implicit reason to trust them‣Key Loggers, root kits, spy ware Do you know of anyone who has fallen victim to oneof these? What can we do?Systems and Internet Infrastructure Security (SIIS) LaboratoryPage2

Trusted Computing The Trusted Computing Group suggests we:‣Deploy a Trusted Platform Module (TPM) in all systems‣And an infrastructure to support their use Shamon? TPMs allow a system to:‣Gather and attest system state‣Store and generate cryptographic data‣Prove platform identitySystems and Internet Infrastructure Security (SIIS) LaboratoryPage3

Virtual Trust? Unfortunately, your computer might be an illusion Advances in hardware virtualization‣Improve system utilization‣Saves money‣Gives the illusion of an independent system A Virtual Machine Monitor(Hypervisor) could control whatdata is measured by the TPMSystems and Internet Infrastructure Security (SIIS) LaboratoryPage4

Virtualize the TPM Cannot have multiple users per TPM Why don’t we just virtualize the TPM?It would violate its security properties‣ Trust rooted in hardware VMs support unique lifecyclesSuspend and Resume on different platforms‣ How do you trust a transient environment?Systems and Internet Infrastructure Security (SIIS) LaboratoryPage5

Requirements Authors identify four requirements for vTPMs:‣Same usage model and command set‣Strong association between VM and its vTPM instance‣Strong association between real TPM and vTPM‣Easy to distinguish between real and virtual TPMSystems and Internet Infrastructure Security (SIIS) LaboratoryPage6

The vTPM Model Similar to Xen, Dom-0:‣Contains access to thehardware TPM‣Control of vTPMinstances‣Can spawn vTPMs Client-side driverrequest are routed tothe server-side driversSystems and Internet Infrastructure Security (SIIS) LaboratoryPage7

Secure Coprocessor The vTPM design was made to be modular PCI-X Cryptographic Coprocessor‣Accelerated cryptographic engine‣Tamper-Responsive ‣Not all TPMs have this supportExpensiveSystems and Internet Infrastructure Security (SIIS) LaboratoryPage8

Xend is your Friend Implementation modified Xen to support the vTPM‣Xen Management tool parses config file‣Xend determines where the vTPM manager is located Xenstore, frontend, backend, hotplug scriptsA table of VM to vTPMs is also maintained‣ Absence of mapping create new instance Presence of mapping resume vTPMSystems and Internet Infrastructure Security (SIIS) LaboratoryPage9

Driver Considerations Existing TPM protocol assumes‣Reliable bus‣Must ensure a response is given to the last messagebefore suspending the OS Shared memory (grant tables) is used tocommunicate between Front and Backends Concurrent accessSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 10

Interesting Issues VM migration Associating vTPM with underlying system Key management Trust ManagementSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 11

VM Migration Created extensions to TPM 1.2 command setvTPM Management / Migration / Utility commands‣ Migration is rather straightforward:‣Create instance with associated nonce‣Lock source with nonce and encrypt with key Wrapped with parent TPM instance SRK‣Serialize and update message digest‣Migrate data, digest and verifySystems and Internet Infrastructure Security (SIIS) LaboratoryPage 12

Associating the Real TPM The TPM has security properties that makes itdifferent from most hardware‣Virturalized TPMs cannot be totally transparent‣Must have knowledge of the underlying system Solution: Divide the PCRs into localities‣Lower set used for system‣Upper set for the vTPM instance Issues with nested VMs?Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 13

Key Hierarchy Root keys stored inside the TPM to prevent leakageEndorsement Key (EK) to identify the platform‣ ‣Manufacture certificates not so common as once prescribedStorage Root Key (SRK) to seal (encrypt) data / keys vTPMs are too ephemeral to bind to hardware TPM‣They are kept independent of the platform‣Speeds key creation‣Persistent store emulated with real TPMSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 14

Trust Management AIKs and SKs follows a chain of keys rootedhardware Programs rely on these keys (TSS, User PS)‣Migrating VMs will change their host TPM EK‣vTPM EKs are freshly generated for each VM‣How can we identify a vTPM EK? Some VMs may not want to be on certain machinesSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 15

Suggestions Create EK’ for each vTPM Create an AIK’ for all vTPMs Use a local authority to verify the vTPM Use a secure coprocessorSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 16

Create an EKSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 17

Create AIKSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 18

Take Away Virtualizing a TPM is not as easy as normal hardware‣Security and trust must be addressed It is not clear how to establish trust in a transientTPM identity‣We can compromiseSystems and Internet Infrastructure Security (SIIS) LaboratoryPage 19

Systems and Internet Infrastructure Security (SIIS) Laboratory Page 3 Trusted Computing The Trusted Computing Group suggests we: ‣ Deploy a Trusted Platform Module (TPM) in all systems ‣ And an infrastructure to support their use Shamon? TPMs allow a system to: ‣ Gather and attest system state ‣ Store and generate cryptographic data ‣ Prove platform identity

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Best Practices for Virtualizing and Managing SharePoint 2013 8 8 their corporate portals and collaboration solutions (such as SharePoint) on production virtual machines.3 Virtualizing SharePoint provides the flexibility and rapid deployment capabilities that are required to meet complex and ever-changing business needs.

S1 Akuntansi Pendidikan Profesi: PPAk S2 Magister Science, Magister Terapan S3 Ilmu Akuntansi Pendidikan IAI: KAPd. dan KASP Asosiasi Profesi Akuntansi: IAPI dan IAMI Asosiasi Profesi lain terkait akuntansi dan Internasional –Internal Auditor, CISA, ACCA, CMA, CIMA, CPA Negara lain Asosiasi Profesi PPAJP Kemenkeu Kemendiknas - DIKTI BNSP OJK Internasional .