Runtime integrity framework based on trusted computing
نویسنده
چکیده
I present in this dissertation, a technique to measure the integrity of an operating system, so that the user can verify that all critical software components, including the operating system kernel, is running in a known valid state. The technique solves a key problem of providing continuous runtime verification of kernel memory-space. The measurement is integrated with a trustworthy verification chain from the firmware, host machine, hypervisor, guest machine to applications, based on existing techniques from Trust Computing and guest security mechanisms. This is accomplished by checking the guest kernel against a known reference, to provide instant feedback on changes in its integrity. A Trusted Platform Module (TPM) is used to provide a complete integrity measurement chain from the hardware to the host and guest system. A working implementation of the entire framework has been achieved for a 64bit Linux host and guest system, using QEMU and KVM as two different virtualization techniques. The implementation has been verified to correctly detect integrity changes in the guest, while maintaining a minimal performance overhead. The technique is generally portable to other operating systems. It is implemented as an integrity measurement framework for the Linux kernel, which can be extended to utilize additional measurement capabilities of the guest operating system, forming a more in-depth measurement. Prototypes for such extensions are implemented using two existing Linux security modules. An example of trusted authentication and host-based intrusion detection has been used as proof-of-concept application scenarios for the integrity measurement framework. Benchmarking on the system shows that the integrity measurement has minimal impact on the guest machine performance, with only slight overhead during the guest machine boot time. Correctness and security strength of the framework were verified using functional and penetration testing.
منابع مشابه
Trusted Virtual Machine Management for Virtualization in Critical Environments
Service providers use virtualization technology to better serve their remote customers and to efficiently use their resources. In particular when virtualization is used within critical infrastructures such as industrial control systems security of the virtual machines is crucial. Creating fully secure systems based on a verified small trusted computing base (TCB) is desirable to minimize the at...
متن کاملProperty-based Integrity Monitoring of Operating System Kernels
Title of dissertation: PROPERTY-BASED INTEGRITY MONITORING OF OPERATING SYSTEM KERNELS Nick Louis Petroni, Jr. Doctor of Philosophy, 2008 Dissertation directed by: Assistant Professor Michael Hicks Department of Computer Science As the foundation of the trusted computing base, the operating system kernel is a valuable target for attackers of a computer system seeking maximum control and privile...
متن کاملNew System Security Mechanisms for the Cloud Computing Infrastructure
AZAB, AHMED MONEEB. New System Security Mechanisms for the Cloud Computing Infrastructure. (Under the direction of Dr. Peng Ning.) Cloud computing is a new computing paradigm, where computing resources are provided as a service to end users. To cut operating costs, hardware virtualization is used so that a single hardware platform is shared among multiple end users. This new paradigm introduces...
متن کاملRuntime Integrity Measurement and Enforcement with Automated Whitelist Generation
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques from information flow control and trusted computing. During a measurement phase, a cloud provider uses dynamic taint tracking to generate a whitelist of executed code and associated file hashes generated by an integrity measurement system. Then, at runtime, it can again use dynamic taint trackin...
متن کاملTrusted VM Snapshots in Untrusted Cloud Infrastructures
A cloud customer’s inability to verifiably trust an infrastructure provider with the security of its data inhibits adoption of cloud computing. Customers could establish trust with secure runtime integrity measurements of their virtual machines (VMs). The runtime state of a VM, captured via a snapshot, is used for integrity measurement, migration, malware detection, correctness validation, and ...
متن کامل