SlideShare a Scribd company logo
Trusted Launch
of Generic Virtual Machine Images
    in Public IaaS Environments

  Nicolae Paladi1*, Christian Gehrmann1,
   Mudassar Aslam1, Fredric Morenius2




     1
         Swedish Institute of Computer Science
                  2
                    Ericsson Research
2



Contents


           1. Infrastructure-as-a-Service
           2. Problem Setting
           3. Attacker Model
           4. Related Work
           5. Protocol Description
           6. Protocol Implementation
           7. Conclusion



                                                              -
                                                         u re
                                                          ct
                                                        ru -
                                                      st a
                                                   fra as- vice
                                                In           r
                                                          Se
3



Infrastructure-as-a-Service
• A 'cloud computing' service model (NIST:2011):



    Provision processing, storage, networks.

    Deploy and run arbitrary software

    No control over underlying cloud infrastructure

    Control over OS, storage, deployed applications.

    Limited control of select networking components.

                                                                 rio
                                                             e na d      s
                                                           Sc an tion
                                                                       i
                                                                    in
                                                                def
4



Scenario and Definitions
                     Scheduler
                        (S)




                  Compute         Compute     Compute
                    Host            Host        Host
                    (CH)            (CH)        (CH)



                 Hardware        Hardware   Hardware
Client (C)                                              f
                                                     rie te
                                                    B o M
                                                      N TP
                                                       on
5


    A Brief Note on TPM
•
   Trusted platform module v1.2 as specified by TCG
•
   v2.0 is currently under review
•
   Tamper-evident
•
  16+ PCRs as volatile or non-volatile storage
Four operations: Signing / Binding / Sealing / Sealed-sign




                                                                   em
                                                               o bl ng
                                                             Pr etti
                                                                S
6


Problem Setting

• “Consumer is able to deploy and run arbitrary software, which can
    include operating systems and applications.”

•
    Client can launch VMs for sensitive computations.

•
    Trusted VM launch – the correct VM is launched in a IaaS
    platform on a host with a known software stack verified to not
    have been modified by malicious actors.

•
    How do we ensure a trusted VM launch in an untrusted
    IaaS environment?
                                                                              er
                                                                        ta c k el
                                                                      At od
                                                                          M
7


Attacker Model


•   (Ar) has root access to IaaS hosts.


•   (Ar) has no physical access.


•   (Ar) has no access to CH's memory.


•   (Ar) can act maliciously or in good faith.
                                                            ck
                                                         tta ario
                                                        A n
                                                            e
                                                         Sc 1
•   (A ) can be a person/malicious software/code bug.
8



Attack scenario 1
                                          Remote Attacker
                       Scheduler
                                                Ar
                          (S)




                    Trusted
                    Compute         Compute
                      Host            Host
                     (CH)             (CH)



                Hardware           Hardware   Hardware
Client (C)                                                ck
                                                       tta ario
                                                      A n
                                                          e
                                                       Sc 2
9



Attack scenario 2
                                  Remote Attacker
                                        Ar




                            Compute     Compute
                              Host        Host
                              (CH)        (CH)



                Hardware   Hardware   Hardware
Client (C)                                          ed
                                                 lat rk
                                               Re o
                                                  W
10


Related Work




                           d
                      u ste d
                    Tr hir ty
                       T ar
                           P
11


Trusted VM Launch Protocol:
Trusted Third Party
•
    Trusted Third Party (TTP) – trusted by C and IaaS, able
    to assess the SP of CH according to predefined guidelines.

•
    Security profile (SP) – verified setup of an VM, trusted by
    the Participants.

•
    Currently no fine-grained scale of SP available.

•
    Limited to only matching the measurements with
    reference values.
                                                                    g
                                                                 Bi e
                                                                e r
                                                              Th ictu
                                                                P
The big picture
                    3.
                               (S)


   1.
                                     4.
                                          5.

         2.
               CH         CH         CH
                                               6.

                                HW
              HW         HW      +
                                TPM                         l
Client (C)                                               c o ion
                                                       to t
                                                     ro crip
                                                    P s 1)
                                                       e (
                                                     D
13


Trusted VM Launch Protocol:
Protocol Details (1)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 2)
                                      e (
                                    D
14


Trusted VM Launch Protocol:
Protocol Details (2)




                                          l
                                        co ion
                                      to t
                                    ro rip
                                   P sc 3)
                                      e (
                                    D
15


Trusted VM Launch Protocol:
Protocol Details (3)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 4)
                                      e (
                                    D
16


Trusted VM Launch Protocol:
Protocol Details (4)




                                                   k
                                             S tac
                                         n
                                    pe
                                   O
18


Trusted VM Launch Protocol:
OpenStack
•
    Protocol was implemented in OpenStack
•
    Open Source IaaS deployment and management
    platform.
•
    Large user base and multiple industry contributors
•
    “Essex” release as baseline.
•
    Aimed to have a minimal footprint in terms of code
    modifications.
•
  Implementation changed 4 components
involved in the launch process (presented next).                   l n
                                                                 co atio
                                                               to t
                                                            r o en
                                                           P m )
                                                               e
                                                             pl (1
                                                         Im
19


Trusted VM Launch Protocol:
Protocol Implementation (1)
Affected components:

•
    Nova SQL db – global security profile per compute host.

•
 Dashboard – request compute host attestation, minimum
SP, TTP’s URL and Token upload.

•
 Scheduler – SimpleScheduler to schedule VM launches on
trusted CH with the requested–or stricter–SP.

•
 Nova compute – support communication with TPM through
TSS, encryption/decryption and VM image integrity
assessment.                                                              l        n
                                                                       co tatio
                                                                    to
                                                                 ro en
                                                                P e m 2)
                                                                  pl (
                                                               Im
20


Trusted VM Launch Protocol:
Protocol Implementation (2)
•
    TrustedComputingPools (currently in blueprints)
    will introduce TPM support in OpenStack

•
    Trusted IaaS provider with untrusted nodes.

•
    Node attestation offered as “premium service”.

•
    Node attestation performed by IaaS provider itself.

                                                                            n
                                                                      u si o
                                                             n   cl
                                                          Co
21



Conclusion
•
    A trusted VM launch protocol available assuming
    an untrusted IaaS platform + TPM + physical
    security of the hosts.

•
    Fairly close to ongoing industrial implementation
    but offers stricter security guarantees.

•
    Fine-grained attestation process on the TTP side
    still a research challenge.

More Related Content

What's hot

深入淺出C語言
深入淺出C語言深入淺出C語言
深入淺出C語言
Simen Li
 
Design and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdfDesign and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdf
ChowdappaKv1
 
Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...
Marina Kolpakova
 
CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12
Ryohei Kobayashi
 
Memory, IPC and L4Re
Memory, IPC and L4ReMemory, IPC and L4Re
Memory, IPC and L4Re
Vasily Sartakov
 
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
Shinya Takamaeda-Y
 
gcov和clang中的实现
gcov和clang中的实现gcov和clang中的实现
gcov和clang中的实现
Ray Song
 
小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器
uchan_nos
 
Smashing The Stack
Smashing The StackSmashing The Stack
Smashing The Stack
Daniele Bellavista
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural Networks
Shinya Takamaeda-Y
 
Workshop NGS data analysis - 3
Workshop NGS data analysis - 3Workshop NGS data analysis - 3
Workshop NGS data analysis - 3
Maté Ongenaert
 
Advanced Components on Top of L4Re
Advanced Components on Top of L4ReAdvanced Components on Top of L4Re
Advanced Components on Top of L4Re
Vasily Sartakov
 

What's hot (13)

深入淺出C語言
深入淺出C語言深入淺出C語言
深入淺出C語言
 
Design and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdfDesign and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdf
 
Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...
 
CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12
 
Memory, IPC and L4Re
Memory, IPC and L4ReMemory, IPC and L4Re
Memory, IPC and L4Re
 
Parallel R
Parallel RParallel R
Parallel R
 
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
 
gcov和clang中的实现
gcov和clang中的实现gcov和clang中的实现
gcov和clang中的实现
 
小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器
 
Smashing The Stack
Smashing The StackSmashing The Stack
Smashing The Stack
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural Networks
 
Workshop NGS data analysis - 3
Workshop NGS data analysis - 3Workshop NGS data analysis - 3
Workshop NGS data analysis - 3
 
Advanced Components on Top of L4Re
Advanced Components on Top of L4ReAdvanced Components on Top of L4Re
Advanced Components on Top of L4Re
 

Viewers also liked

New Pr Ofesy Conference Presentation
New Pr Ofesy Conference PresentationNew Pr Ofesy Conference Presentation
New Pr Ofesy Conference Presentation
cjoynson
 
Launch phases generic pharma
Launch phases generic pharmaLaunch phases generic pharma
Launch phases generic pharma
Breckenridge Pharmaceutical, Inc.
 
Barker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare SeedsBarker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare Seeds
Aliki85w
 
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and ConfigurationMarc Combes
 
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...Marc Combes
 
Lund security workshop_presentation
Lund security workshop_presentationLund security workshop_presentation
Lund security workshop_presentation
npaladi
 
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und StrategieMarc Combes
 
Scroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlScroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlKTAssoc
 
Scroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlScroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlKTAssoc
 
Central Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger ReliefCentral Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger Relief
Aliki85w
 
Custom Android Code Templates
Custom Android Code TemplatesCustom Android Code Templates
Custom Android Code Templatesmurphonic
 
Basic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, CaliforniaBasic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, California
Aliki85w
 
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...Marc Combes
 
Brand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XBrand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XSatyajit Hui
 
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Aliki85w
 
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere PartnerMarc Combes
 
Alley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of MissouriAlley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of Missouri
Aliki85w
 
Glenmark analyst ppt
Glenmark analyst pptGlenmark analyst ppt
Glenmark analyst ppt
Kevin Simon
 
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Eularis
 

Viewers also liked (20)

New Pr Ofesy Conference Presentation
New Pr Ofesy Conference PresentationNew Pr Ofesy Conference Presentation
New Pr Ofesy Conference Presentation
 
Launch phases generic pharma
Launch phases generic pharmaLaunch phases generic pharma
Launch phases generic pharma
 
Barker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare SeedsBarker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare Seeds
 
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
 
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
 
Lund security workshop_presentation
Lund security workshop_presentationLund security workshop_presentation
Lund security workshop_presentation
 
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
 
Scroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlScroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nl
 
Scroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlScroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nl
 
Central Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger ReliefCentral Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger Relief
 
Custom Android Code Templates
Custom Android Code TemplatesCustom Android Code Templates
Custom Android Code Templates
 
Basic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, CaliforniaBasic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, California
 
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
 
Brand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XBrand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-X
 
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
 
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
 
Alley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of MissouriAlley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of Missouri
 
Glenmark analyst ppt
Glenmark analyst pptGlenmark analyst ppt
Glenmark analyst ppt
 
generic drugs
generic drugs generic drugs
generic drugs
 
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
 

Similar to Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
Me3D: A Model-driven Methodology  Expediting Embedded Device  Driver DevelopmentMe3D: A Model-driven Methodology  Expediting Embedded Device  Driver Development
Me3D: A Model-driven Methodology Expediting Embedded Device Driver Developmenthuichenphd
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
Brent Salisbury
 
Leveraging open source for large scale analytics
Leveraging open source for large scale analyticsLeveraging open source for large scale analytics
Leveraging open source for large scale analytics
South West Data Meetup
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Anne Nicolas
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
GoWireless
 
Stefano Giordano
Stefano  GiordanoStefano  Giordano
Stefano Giordano
GoWireless
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kuniyasu Suzaki
 
c-quilibrium R forecasting integration
c-quilibrium R forecasting integrationc-quilibrium R forecasting integration
c-quilibrium R forecasting integration
AE - architects for business and ict
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchCrypto Cg
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchMarisa Paryasto
 
2015 10-30 面試心得分享
2015 10-30 面試心得分享2015 10-30 面試心得分享
2015 10-30 面試心得分享
Hung Liu
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012
Brent Salisbury
 
Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)
Dario Faggioli
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
Shivam Singh
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
Eric Verhulst
 
The trials and tribulations of providing engineering infrastructure
 The trials and tribulations of providing engineering infrastructure  The trials and tribulations of providing engineering infrastructure
The trials and tribulations of providing engineering infrastructure
TechExeter
 
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT TalksMykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Vadym Muliavka
 

Similar to Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments (20)

Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
Me3D: A Model-driven Methodology  Expediting Embedded Device  Driver DevelopmentMe3D: A Model-driven Methodology  Expediting Embedded Device  Driver Development
Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
Leveraging open source for large scale analytics
Leveraging open source for large scale analyticsLeveraging open source for large scale analytics
Leveraging open source for large scale analytics
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
Stefano Giordano
Stefano  GiordanoStefano  Giordano
Stefano Giordano
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
c-quilibrium R forecasting integration
c-quilibrium R forecasting integrationc-quilibrium R forecasting integration
c-quilibrium R forecasting integration
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd research
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd research
 
2015 10-30 面試心得分享
2015 10-30 面試心得分享2015 10-30 面試心得分享
2015 10-30 面試心得分享
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012
 
Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)
 
R intro
R introR intro
R intro
 
ISAC-Projects
ISAC-ProjectsISAC-Projects
ISAC-Projects
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
 
The trials and tribulations of providing engineering infrastructure
 The trials and tribulations of providing engineering infrastructure  The trials and tribulations of providing engineering infrastructure
The trials and tribulations of providing engineering infrastructure
 
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT TalksMykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

  • 1. Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments Nicolae Paladi1*, Christian Gehrmann1, Mudassar Aslam1, Fredric Morenius2 1 Swedish Institute of Computer Science 2 Ericsson Research
  • 2. 2 Contents 1. Infrastructure-as-a-Service 2. Problem Setting 3. Attacker Model 4. Related Work 5. Protocol Description 6. Protocol Implementation 7. Conclusion - u re ct ru - st a fra as- vice In r Se
  • 3. 3 Infrastructure-as-a-Service • A 'cloud computing' service model (NIST:2011):  Provision processing, storage, networks.  Deploy and run arbitrary software  No control over underlying cloud infrastructure  Control over OS, storage, deployed applications.  Limited control of select networking components. rio e na d s Sc an tion i in def
  • 4. 4 Scenario and Definitions Scheduler (S) Compute Compute Compute Host Host Host (CH) (CH) (CH) Hardware Hardware Hardware Client (C) f rie te B o M N TP on
  • 5. 5 A Brief Note on TPM • Trusted platform module v1.2 as specified by TCG • v2.0 is currently under review • Tamper-evident • 16+ PCRs as volatile or non-volatile storage Four operations: Signing / Binding / Sealing / Sealed-sign em o bl ng Pr etti S
  • 6. 6 Problem Setting • “Consumer is able to deploy and run arbitrary software, which can include operating systems and applications.” • Client can launch VMs for sensitive computations. • Trusted VM launch – the correct VM is launched in a IaaS platform on a host with a known software stack verified to not have been modified by malicious actors. • How do we ensure a trusted VM launch in an untrusted IaaS environment? er ta c k el At od M
  • 7. 7 Attacker Model • (Ar) has root access to IaaS hosts. • (Ar) has no physical access. • (Ar) has no access to CH's memory. • (Ar) can act maliciously or in good faith. ck tta ario A n e Sc 1 • (A ) can be a person/malicious software/code bug.
  • 8. 8 Attack scenario 1 Remote Attacker Scheduler Ar (S) Trusted Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ck tta ario A n e Sc 2
  • 9. 9 Attack scenario 2 Remote Attacker Ar Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ed lat rk Re o W
  • 10. 10 Related Work d u ste d Tr hir ty T ar P
  • 11. 11 Trusted VM Launch Protocol: Trusted Third Party • Trusted Third Party (TTP) – trusted by C and IaaS, able to assess the SP of CH according to predefined guidelines. • Security profile (SP) – verified setup of an VM, trusted by the Participants. • Currently no fine-grained scale of SP available. • Limited to only matching the measurements with reference values. g Bi e e r Th ictu P
  • 12. The big picture 3. (S) 1. 4. 5. 2. CH CH CH 6. HW HW HW + TPM l Client (C) c o ion to t ro crip P s 1) e ( D
  • 13. 13 Trusted VM Launch Protocol: Protocol Details (1) l c o ion to t ro crip P s 2) e ( D
  • 14. 14 Trusted VM Launch Protocol: Protocol Details (2) l co ion to t ro rip P sc 3) e ( D
  • 15. 15 Trusted VM Launch Protocol: Protocol Details (3) l c o ion to t ro crip P s 4) e ( D
  • 16. 16 Trusted VM Launch Protocol: Protocol Details (4) k S tac n pe O
  • 17. 18 Trusted VM Launch Protocol: OpenStack • Protocol was implemented in OpenStack • Open Source IaaS deployment and management platform. • Large user base and multiple industry contributors • “Essex” release as baseline. • Aimed to have a minimal footprint in terms of code modifications. • Implementation changed 4 components involved in the launch process (presented next). l n co atio to t r o en P m ) e pl (1 Im
  • 18. 19 Trusted VM Launch Protocol: Protocol Implementation (1) Affected components: • Nova SQL db – global security profile per compute host. • Dashboard – request compute host attestation, minimum SP, TTP’s URL and Token upload. • Scheduler – SimpleScheduler to schedule VM launches on trusted CH with the requested–or stricter–SP. • Nova compute – support communication with TPM through TSS, encryption/decryption and VM image integrity assessment. l n co tatio to ro en P e m 2) pl ( Im
  • 19. 20 Trusted VM Launch Protocol: Protocol Implementation (2) • TrustedComputingPools (currently in blueprints) will introduce TPM support in OpenStack • Trusted IaaS provider with untrusted nodes. • Node attestation offered as “premium service”. • Node attestation performed by IaaS provider itself. n u si o n cl Co
  • 20. 21 Conclusion • A trusted VM launch protocol available assuming an untrusted IaaS platform + TPM + physical security of the hosts. • Fairly close to ongoing industrial implementation but offers stricter security guarantees. • Fine-grained attestation process on the TTP side still a research challenge.