SlideShare a Scribd company logo
System Security Lab




                   Trusted Virtual Domains
                                                 on

             Usable Secure Desktop Environments

             Hans Löhr, Thomas Pöppelmann, Johannes Rave,
                   Martin Steegmanns, Marcel Winandy



5th Annual Workshop on Scalable Trusted Computing (STC 2010)
co-located to ACM CCS, Chicago, 4th October 2010
System Security Lab




           Trusted Virtual Domains (TVDs)




    ●    Coalition of virtual machines (VMs)
    ●    Distributed over various physical platforms
    ●    Same trust level, same security policy
    ●    Transparent policy enforcement

   Marcel Winandy           Trusted Virtual Domains on OpenSolaris   2
System Security Lab




        TVD Implementations – Why a new one?
    ●    TVDs on Xen:
          ●   Required several changes in Xen and dom0
              (e.g. sHype in Xen, vSwitch in dom0, etc....)
          ●   Large VM images to deploy (e.g. Vista: ~ 2 GB)
          ●   Focus on data centers
    ●    TVD on OpenSolaris:
          ●   Focus on end-user desktop systems
          ●   Lightweight virtualization
          ●   Requires no changes in kernel or core system
   Marcel Winandy            Trusted Virtual Domains on OpenSolaris   3
System Security Lab




        Security Features of OpenSolaris
    ●    Zones: Lightweight (OS) virtualization
    ●    ZFS: Efficient file system
    ●    MLS: built-in mandatory access control
    ●    Secure GUI: trusted path, MLS support


                      And all comes for free !!!


   Marcel Winandy           Trusted Virtual Domains on OpenSolaris   4
System Security Lab




       TVD on OpenSolaris: Architecture




                                                               Our Contribution



   Marcel Winandy     Trusted Virtual Domains on OpenSolaris                 5
System Security Lab
                      User Desktop




   Marcel Winandy     Trusted Virtual Domains on OpenSolaris   6
System Security Lab




                      Mapping TVD to MLS
    ●    MLS: classification (level) + compartment (category)
    ●    TVDs: non-hierarchical
    ●    Solution: all TVDs same level, but distinct compartments
         (240 possible TVDs)




                           Trusted Virtual Domains on OpenSolaris   7
System Security Lab




                       TVD Management
    ●    Simple TVD management (Admin)
          ●   Creation: name, description, network segment
          ●   Assignment of users and zone images
    ●    Automatic and transparent policy distribution
          ●   Global Policy: MLS labels, user assignments
          ●   Local Policy: allowed zones, network config, etc.
          ●   Platform Policy: defines secure channel between
              master and platforms


   Marcel Winandy           Trusted Virtual Domains on OpenSolaris   8
System Security Lab




        Efficient Zone Image Deployment (1)
    ●    User Login: can choose working environments




   Marcel Winandy      Trusted Virtual Domains on OpenSolaris   9
System Security Lab




        Efficient Zone Image Deployment (2)
    ●    Minimal standard zone: 1.4 GB (!)
    ●    But: ZFS features clones and snapshots
          ●   Every image is snapshot of a zone
          ●   Snapshots can have dependencies (delta images)
    ●    Tree-like organization:
          ●   Base zone images
          ●   Other zones are derived from base image
    ●    Deployment: base in cache, deploy deltas only!

   Marcel Winandy           Trusted Virtual Domains on OpenSolaris   10
System Security Lab




              Protected Storage Devices (1)
    ●    Encrypted Home Directories
          ●   Stored on central server (via NFS)
          ●   Loopback-mounted (lofi) with built-in encryption
          ●   TVD layer: management of encryption key
    ●    Mobile Storage Devices (e.g. USB sticks)
          ●   Similar approach
          ●   Transparent encryption after assignment to a TVD



   Marcel Winandy           Trusted Virtual Domains on OpenSolaris   11
System Security Lab




             Protected Storage Devices (2)
    ●    User attaches new USB device




   Marcel Winandy     Trusted Virtual Domains on OpenSolaris   12
System Security Lab




             Protected Storage Devices (3)
  ●    Transparent encryption after assignment to TVD




   Marcel Winandy     Trusted Virtual Domains on OpenSolaris   13
System Security Lab




                                  Conclusion
    ●   TVD on OpenSolaris:
        efficient and usable TVD realization for end-user desktop systems
    ●   Leverages existing OpenSolaris features
        ●   Zones, MLS, ZFS, Secure GUI
    ●   Adds new components
        ●   Server infrastructure (TVD Master), local TVD Layer
        ●   Transparent data encryption (home + USB sticks)
        ●   Efficient zone image deployment
    ●   No changes on kernel or core OS services

                                        More information:
                           http://www.trust.rub.de/projects/tvd-solaris



   Marcel Winandy                 Trusted Virtual Domains on OpenSolaris    14

More Related Content

What's hot

Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
University of Central Punjab
 
Linux Workshop , Day 3
Linux Workshop , Day 3Linux Workshop , Day 3
Linux Workshop , Day 3
Quotient Technology Inc.
 
Linux- The open source system kernel
Linux- The open source system kernelLinux- The open source system kernel
Linux- The open source system kernel
PrasadKulkarni201
 
Linux basics
Linux basicsLinux basics
Linux basics
BiplabaSamantaray
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009
James Morris
 
Linux Operating System Fundamentals
Linux Operating System FundamentalsLinux Operating System Fundamentals
Linux Operating System Fundamentals
Anshul Patel
 
Linux mint
Linux mint Linux mint
Linux mint
Poi Poi
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
James Morris
 
Metasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source ConferenceMetasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source Conference
Jason Wood
 
Linux
LinuxLinux
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDF
Mohamed Ben Bouzid
 
Becoming Linux Expert Series-Install Linux Operating System
Becoming Linux Expert Series-Install Linux Operating SystemBecoming Linux Expert Series-Install Linux Operating System
Becoming Linux Expert Series-Install Linux Operating System
skbansal222
 
Trojan linux
Trojan linuxTrojan linux
Trojan linux
Burak Duran
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
Stephen Ahiante
 
Linux
LinuxLinux
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: Introduction
Damian T. Gordon
 
History of linux
History of linuxHistory of linux
History of linux
Adarsh Kr Sinha
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
Vikash Agrawal
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
Damian T. Gordon
 
Linux
LinuxLinux
Linux
jc1258
 

What's hot (20)

Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
 
Linux Workshop , Day 3
Linux Workshop , Day 3Linux Workshop , Day 3
Linux Workshop , Day 3
 
Linux- The open source system kernel
Linux- The open source system kernelLinux- The open source system kernel
Linux- The open source system kernel
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009
 
Linux Operating System Fundamentals
Linux Operating System FundamentalsLinux Operating System Fundamentals
Linux Operating System Fundamentals
 
Linux mint
Linux mint Linux mint
Linux mint
 
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century ThreatsLinux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
 
Metasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source ConferenceMetasploit @ 2010 Utah Open Source Conference
Metasploit @ 2010 Utah Open Source Conference
 
Linux
LinuxLinux
Linux
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDF
 
Becoming Linux Expert Series-Install Linux Operating System
Becoming Linux Expert Series-Install Linux Operating SystemBecoming Linux Expert Series-Install Linux Operating System
Becoming Linux Expert Series-Install Linux Operating System
 
Trojan linux
Trojan linuxTrojan linux
Trojan linux
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Linux
LinuxLinux
Linux
 
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: Introduction
 
History of linux
History of linuxHistory of linux
History of linux
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
Linux
LinuxLinux
Linux
 

Viewers also liked

Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Marcel Winandy
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
Marcel Winandy
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Marcel Winandy
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
Marcel Winandy
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Compartmented Security for Browsers
Compartmented Security for BrowsersCompartmented Security for Browsers
Compartmented Security for Browsers
Marcel Winandy
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Marcel Winandy
 

Viewers also liked (7)

Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One DeviceUni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
 
A Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface SystemsA Pattern for Secure Graphical User Interface Systems
A Pattern for Secure Graphical User Interface Systems
 
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web AuthenticationTruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
 
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health CardA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Compartmented Security for Browsers
Compartmented Security for BrowsersCompartmented Security for Browsers
Compartmented Security for Browsers
 
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
 

Similar to Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments

XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
The Linux Foundation
 
Windows nt
Windows ntWindows nt
Windows nt
Mohd Arif
 
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
The Linux Foundation
 
Container Security: How We Got Here and Where We're Going
Container Security: How We Got Here and Where We're GoingContainer Security: How We Got Here and Where We're Going
Container Security: How We Got Here and Where We're Going
Phil Estes
 
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nubeVirtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Nextel S.A.
 
Synology DSM 4.0 - What's new Presentation
Synology DSM 4.0 - What's new PresentationSynology DSM 4.0 - What's new Presentation
Synology DSM 4.0 - What's new Presentation
Gert Wuyts
 
Dsm4 0training-120115145240-phpapp02
Dsm4 0training-120115145240-phpapp02Dsm4 0training-120115145240-phpapp02
Dsm4 0training-120115145240-phpapp02
Darren Lin
 
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support UnikernelsExtending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
Stefano Salsano
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server Architecture
Novell
 
Container Security
Container SecurityContainer Security
Container Security
Salman Baset
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
shira koper
 
Bootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on LinuxBootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on Linux
Maximiliano Accotto
 
OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016
Alexandru Coman
 
Phantosys innovation for home office and BYOD
Phantosys innovation for home office and BYODPhantosys innovation for home office and BYOD
Phantosys innovation for home office and BYOD
Jose Bittencourt
 
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdfOpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
ssuser9e06a61
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
Robert Bohne
 
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE SystemsXPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
The Linux Foundation
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
Precisely
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
建澄 吳
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
Chien Cheng Wu
 

Similar to Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments (20)

XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
XPDDS18: Introducing ViryaOS: Secure Containers for Embedded and IoT - Stefan...
 
Windows nt
Windows ntWindows nt
Windows nt
 
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
XPDS13: Xen in OSS based In–Vehicle Infotainment Systems - Artem Mygaiev, Glo...
 
Container Security: How We Got Here and Where We're Going
Container Security: How We Got Here and Where We're GoingContainer Security: How We Got Here and Where We're Going
Container Security: How We Got Here and Where We're Going
 
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nubeVirtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
 
Synology DSM 4.0 - What's new Presentation
Synology DSM 4.0 - What's new PresentationSynology DSM 4.0 - What's new Presentation
Synology DSM 4.0 - What's new Presentation
 
Dsm4 0training-120115145240-phpapp02
Dsm4 0training-120115145240-phpapp02Dsm4 0training-120115145240-phpapp02
Dsm4 0training-120115145240-phpapp02
 
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support UnikernelsExtending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server Architecture
 
Container Security
Container SecurityContainer Security
Container Security
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
 
Bootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on LinuxBootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on Linux
 
OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016
 
Phantosys innovation for home office and BYOD
Phantosys innovation for home office and BYODPhantosys innovation for home office and BYOD
Phantosys innovation for home office and BYOD
 
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdfOpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
 
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE SystemsXPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 

More from Marcel Winandy

Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
Marcel Winandy
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
Marcel Winandy
 
Securing the E-Health Cloud
Securing the E-Health CloudSecuring the E-Health Cloud
Securing the E-Health Cloud
Marcel Winandy
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
Marcel Winandy
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Marcel Winandy
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
Marcel Winandy
 

More from Marcel Winandy (6)

Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
 
Securing the E-Health Cloud
Securing the E-Health CloudSecuring the E-Health Cloud
Securing the E-Health Cloud
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
 
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
 

Recently uploaded

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 

Recently uploaded (20)

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 

Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments

  • 1. System Security Lab Trusted Virtual Domains on Usable Secure Desktop Environments Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy 5th Annual Workshop on Scalable Trusted Computing (STC 2010) co-located to ACM CCS, Chicago, 4th October 2010
  • 2. System Security Lab Trusted Virtual Domains (TVDs) ● Coalition of virtual machines (VMs) ● Distributed over various physical platforms ● Same trust level, same security policy ● Transparent policy enforcement Marcel Winandy Trusted Virtual Domains on OpenSolaris 2
  • 3. System Security Lab TVD Implementations – Why a new one? ● TVDs on Xen: ● Required several changes in Xen and dom0 (e.g. sHype in Xen, vSwitch in dom0, etc....) ● Large VM images to deploy (e.g. Vista: ~ 2 GB) ● Focus on data centers ● TVD on OpenSolaris: ● Focus on end-user desktop systems ● Lightweight virtualization ● Requires no changes in kernel or core system Marcel Winandy Trusted Virtual Domains on OpenSolaris 3
  • 4. System Security Lab Security Features of OpenSolaris ● Zones: Lightweight (OS) virtualization ● ZFS: Efficient file system ● MLS: built-in mandatory access control ● Secure GUI: trusted path, MLS support And all comes for free !!! Marcel Winandy Trusted Virtual Domains on OpenSolaris 4
  • 5. System Security Lab TVD on OpenSolaris: Architecture Our Contribution Marcel Winandy Trusted Virtual Domains on OpenSolaris 5
  • 6. System Security Lab User Desktop Marcel Winandy Trusted Virtual Domains on OpenSolaris 6
  • 7. System Security Lab Mapping TVD to MLS ● MLS: classification (level) + compartment (category) ● TVDs: non-hierarchical ● Solution: all TVDs same level, but distinct compartments (240 possible TVDs) Trusted Virtual Domains on OpenSolaris 7
  • 8. System Security Lab TVD Management ● Simple TVD management (Admin) ● Creation: name, description, network segment ● Assignment of users and zone images ● Automatic and transparent policy distribution ● Global Policy: MLS labels, user assignments ● Local Policy: allowed zones, network config, etc. ● Platform Policy: defines secure channel between master and platforms Marcel Winandy Trusted Virtual Domains on OpenSolaris 8
  • 9. System Security Lab Efficient Zone Image Deployment (1) ● User Login: can choose working environments Marcel Winandy Trusted Virtual Domains on OpenSolaris 9
  • 10. System Security Lab Efficient Zone Image Deployment (2) ● Minimal standard zone: 1.4 GB (!) ● But: ZFS features clones and snapshots ● Every image is snapshot of a zone ● Snapshots can have dependencies (delta images) ● Tree-like organization: ● Base zone images ● Other zones are derived from base image ● Deployment: base in cache, deploy deltas only! Marcel Winandy Trusted Virtual Domains on OpenSolaris 10
  • 11. System Security Lab Protected Storage Devices (1) ● Encrypted Home Directories ● Stored on central server (via NFS) ● Loopback-mounted (lofi) with built-in encryption ● TVD layer: management of encryption key ● Mobile Storage Devices (e.g. USB sticks) ● Similar approach ● Transparent encryption after assignment to a TVD Marcel Winandy Trusted Virtual Domains on OpenSolaris 11
  • 12. System Security Lab Protected Storage Devices (2) ● User attaches new USB device Marcel Winandy Trusted Virtual Domains on OpenSolaris 12
  • 13. System Security Lab Protected Storage Devices (3) ● Transparent encryption after assignment to TVD Marcel Winandy Trusted Virtual Domains on OpenSolaris 13
  • 14. System Security Lab Conclusion ● TVD on OpenSolaris: efficient and usable TVD realization for end-user desktop systems ● Leverages existing OpenSolaris features ● Zones, MLS, ZFS, Secure GUI ● Adds new components ● Server infrastructure (TVD Master), local TVD Layer ● Transparent data encryption (home + USB sticks) ● Efficient zone image deployment ● No changes on kernel or core OS services More information: http://www.trust.rub.de/projects/tvd-solaris Marcel Winandy Trusted Virtual Domains on OpenSolaris 14