1 / 7

Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA)

Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA). Vikram Adve , Krste Asanović , David Evans, Sam King, Greg Morrisett , R. Sekar , Dawn Song, David Wagner (PI) http://www.dhosa.org/. Vikram Adve (UIUC). Krste Asanović (UC Berkeley).

mikko
Download Presentation

Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems(DHOSA) VikramAdve, KrsteAsanović, David Evans, Sam King, Greg Morrisett, R. Sekar, Dawn Song, David Wagner (PI) http://www.dhosa.org/

  2. VikramAdve(UIUC) KrsteAsanović(UC Berkeley) David Evans(U Virginia) Sam King(UIUC) Greg Morrisett(Harvard) R. Sekar(Stony Brook) Dawn Song(UC Berkeley) David Wagner(UC Berkeley)

  3. Overview Conventional wisdom: If the OS is malicious or subverted, you are hosed. This project: Actually, maybe there is hope… Project goal: Explore new approaches to defend against a malicious OS.

  4. Problem Statement Defend against a compromised, hostile, or malicious operating system. Today: If the OS is malicious, all is lost. Desired end state: We can survive a malicious OS, perhaps with degraded functionality or availability.

  5. Exploring New Territory • This is exploratory research.(Not an engineering project.) • We are exploring many approaches to the problem. We do not know which will prove most effective. Some may fail. • We hope some of our ideas will have applications to other security problems outside of the hostile OS problem.

  6. SVA Cryptographic secure computation e.g., Enforce properties on a malicious OS Binary translation andemulation Data-centric security e.g., Enable complex distributed systems, with resilience to hostile OS’s Formal methods Secure browser appliance transformation Hardware support for isolation Secure servers e.g., Prevent dataexfiltration Dealing with malicious hardware web-based architectures HARDWARE SYstem architectures

  7. Agenda 8:30- 9:00 Welcome + Overview 9:00- 9:30 Secure Virtual Architecture 9:30- 9:50 Binary translation 9:50-10:20 Formal methods 10:20-10:35 Testing binary emulators 10:50-11:10 Hardware support 11:10-11:25 Defenses against malicious hardware 11:25-11:40 Cryptographic secure computation 11:40-12:20 Lunch 12:20-12:50 Data-centric security 12:50- 1:20 Secure web-based architecture 1:20- 1:45 Discussion and feedback

More Related