60 likes | 216 Views
Towards End-to-End Security Analysis of Networked Systems. Deepak Garg, Jason Franklin , Dilsun Kaynar, and Anupam Datta. Secure Hamburgers. User Level Programs. Malicious Mustard. Lettuce. Operating System. Virtual Machine Monitor. Hardware.
E N D
Towards End-to-End Security Analysis of Networked Systems Deepak Garg, Jason Franklin, Dilsun Kaynar, and Anupam Datta
Secure Hamburgers User Level Programs Malicious Mustard Lettuce Operating System Virtual Machine Monitor Hardware * My apologies to any vegetarian or hungry members of the audience.
Networked Secure Hamburgers Malicious Mustard Virtual Machine Virtual Machine … Malicious Mustard Client Virtual Machine Monitor Malicious Mustard Memory Hardware Secure Co-processor Feisty Fries
Logic of Secure Hamburgers Malicious local threads can corrupt unprotected data and code Malicious Mustard Killer Ketchup Key: Control Flow Hardware Resets Trusted Computing Technology old NEW!!! Memory Memory Protection Time Threads Network Comm. Crypto.
Verifying Implementations • Found vulnerabilities in hypervisor design and implementation
Hungry for More? • CMU Theory of Secure Systems Project • http://www.cs.cmu.edu/~jfrankli/toss