Transcript NGSCB

The Trusted Computing (TC) and
Next Generation Secured
Computing Base (NGSCB)
NGSCB
1
Introduction – TC, TCG, NGSCB
TC = Trusted Computing, TCG = Trusted
Computing Group, NGSCB = Microsoft’s
TC
Original Motivation for TC:
TC was intended for DRM
Limits the abuse of file sharing over the network
Prevent making illegal copies without the
authorization from the vendor
Restrict user’s computing actions
NGSCB
2
Current Motivation for TC
“For years, Bill Gate has dreamed of
finding a way to make the Chinese pay for
software: TC looks like being the answer
to his prayer.” – Ross Anderson
NGSCB
3
Fundamental Concepts of TC
Software runs and communicates securely
over applications and servers
Use “locked-down” architecture
Hardware level cryptographic keys for encryption
and authentication
Tamper-resistant
Seal secure data within curtained memory
Input/Output communication path are
encrypted
NGSCB
4
TCG
Many vendors provide hardware support
for major components of NGSCB
For example, Intel’s LaGrande Technology (LT)
and AMD’s Secure Execution Mode (SEM)
technology
TCG is an alliance of Microsoft
Manages TC activities for different
hardware/software vendors: AMD, HP,
IBM, and others
NGSCB
5
Trusted Computing Base = TCB
 TCB is everything in the operating system that
we rely on for security
 If TCB is damaged/non-secured, the whole
system broken.
 If the system is broken, and TCB is OK, we still
have system security
 Integrated into the system (combines software
and hardware components)
 Responsible for regulating information security
policies
 Consists of Kernel + OS
NGSCB
6
TC -- overview
NGSCB
7
TC
Any trusted platform has the following
three fundamental features:
Protected Capabilities
Integrity Capabilities
Integrity Reporting
NGSCB
8
NGSCB
Microsoft’s version of TC: NGSCB
Will be implemented in the upcoming
version of Windows: as known as
Microsoft Windows Longhorn/Vista
Architecture
Computing Environments
Four Features of NGSCB
NGSCB
9
NGSCB - architecture
NGSCB
10
NGSCB – Computing Environments
Overview
 NSGCB operates two operating systems in ONE system
 Two Modes:
 Normal Mode vs. Trusted Mode
 Normal Mode:
 Un-protected environment
 Same as our current Windows series
 Fully Controlled by the users
 Trusted Mode:
 Protected environment
 Users have no authorities to modify, delete, or copy ANY content.
 Implemented TC: Hardware and Software implementation
 Fully Controlled by the computers
NGSCB
11
NGSCB - architecture
Two primary system components in
NGSCB – Nexus and NCA
Nexus
Special kernel (core of the trusted operating)
Goal: Isolate the process of normal mode and
trusted mode differently in memory
Functionality: Authenticate and protect data
(entered, stored, communicated, and displayed)
by data encryption
NGSCB
12
NGSCB - architecture
Nexus Computing Agent (NCA)
Trusted software component
Runs in trusted mode that communicates with
Nexus
Open-source for NCA specifications
Developers can make their own agents to run
on the trusted platform
NGSCB
13
NGSCB – operating environments
NGSCB
14
NGSCB – operating environments
Microsoft claims: “Only an NGSCB trusted
application, NCA, can run securely within
the protected operating environment.”
NCA
Defined by software developers
Policies
Security authentication
Security authorization
NGSCB
15
NGSCB – Four Features
Strong Process Isolation
Sealed Storage
Attestation
Secured Path to the user
NGSCB
16
NGSCB – Four Features
Strong Process Isolation
Isolate protected and non-protected operating
environment that are stored in the same
memory
Blocks the access of Direct Memory Access
(DMA) devices in term of writing and reading to
secured block of memory
Block access of malicious code
Claim: “no illegitimate access will occurring in
protected environment”
NGSCB
17
NGSCB – Four Features
Sealed storage
Ensures the privacy of NGSCB data are not
being exposed
NGSCB uses Security Support Component
(SSC) to do this
SSC has its own encryption services and can
be managed by the Nexus
Uses Advance Encryption Standard (AES), pair
of public and private keys, and keys derived for
trusted application
NGSCB
18
NGSCB – Four Features
Sealed Storage
NCA uses these keys to encrypt data, access
file system, and provide storage services.
Claim: No unauthorized application can read
the sealed storage whatsoever (at boot up, or
running)
NGSCB
19
NGSCB – Four Features
Cryptographic Attestation
Confirm to the recipient that the data was digital
signed by the NGSCB and data was
cryptographically identifiable
Authenticates software Process
Prove application identity
Useful in networking, prove its identity securely
before transmit any data.
Avoid Man in the Middle attack?
NGSCB
20
NGSCB – Four Features
 Secure Path to the user
Ensure the information remains securely through the
input/output of the devices.
Encrypt the input/output, creates a secure path.
Protects computer from:
 Keystroke recorded
 Hardware devices
Need to upgrade current hardware devices:
mouse/keyboard/USB devices/ video adapter
Input: upgrade to USB devices: Smart cards, biometrics,
others
Output: upgrade to Graphic adapter, which prevent
read/write to video memory
NGSCB
21
NGSCB Applications
 Example: Microsoft Word
Restrict user:
View/Copy/Write/Open/Close
Not compatible with other *.doc applications, ie.
OpenOffice
Written document is Signed and Encrypted with
Microsoft Word --- Only Word has the private key
to decrypt it…
NGSCB
22
NGSCB Application
Example: Network application
Cannot file-sharing via P2P
Cannot open your friend’s packed programs
Presumably Secured with connected in network
Example: Microsoft Explorer / Outlook
User might be able to see the content but not
able to “Copy-and-Paste” to other applications
Users have no longer have the capability to “do
whatever they want to do”
NGSCB
23
Analysis of NGSCB
Will this succeed?
NGSCB
24