1 / 6

Towards End-to-End Security Analysis of Networked Systems

Towards End-to-End Security Analysis of Networked Systems. Deepak Garg, Jason Franklin , Dilsun Kaynar, and Anupam Datta. Secure Hamburgers. User Level Programs. Malicious Mustard. Lettuce. Operating System. Virtual Machine Monitor. Hardware.

maree
Download Presentation

Towards End-to-End Security Analysis of Networked Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Towards End-to-End Security Analysis of Networked Systems Deepak Garg, Jason Franklin, Dilsun Kaynar, and Anupam Datta

  2. Secure Hamburgers User Level Programs Malicious Mustard Lettuce Operating System Virtual Machine Monitor Hardware * My apologies to any vegetarian or hungry members of the audience.

  3. Networked Secure Hamburgers Malicious Mustard Virtual Machine Virtual Machine … Malicious Mustard Client Virtual Machine Monitor Malicious Mustard Memory Hardware Secure Co-processor Feisty Fries

  4. Logic of Secure Hamburgers Malicious local threads can corrupt unprotected data and code Malicious Mustard Killer Ketchup Key: Control Flow Hardware Resets Trusted Computing Technology old NEW!!! Memory Memory Protection Time Threads Network Comm. Crypto.

  5. Verifying Implementations • Found vulnerabilities in hypervisor design and implementation

  6. Hungry for More? • CMU Theory of Secure Systems Project • http://www.cs.cmu.edu/~jfrankli/toss

More Related