Modern Systems: Security
Outline Outline
What We’ve Been Talking About... ○ ○ Introduction
What We’ve Been Talking About... ○ ○ Introduction
What are Security Risks? Introduction
Today’s Topic Introduction
Two Systems Nexus Fabric Introduction
Two Systems Nexus Fabric Introduction
Outline Outline
Trust Establishment ○ ○ ○ Background
Authorization principal : a user, group, system component, computer etc. that a security Background system trusts implicitly
Outline Outline
Nexus [SOSP’11] OS approach to security, introduces logical attestation
Overview Nexus
Trusted Platform Modules Nexus
The Problem with TPM ○ ○ ○ Nexus
Credentials-Based Authorization ○ Nexus
Logical Attestation ⇔ Nexus
Logical Attestation cont. Nexus
Nexus OS Nexus
Implementation: Nexus OS Nexus
Implementing Logical Attestation Labels Nexus
Introspection & Interpositioning Nexus
Nexus OS Nexus
Applications Nexus
Case Example: Fauxbook Nexus
Evaluation Results Nexus
Evaluation Results Nexus
Evaluation Results Nexus
Outline Outline
Fabric [SOSP ‘09] PL approach to secure distributed systems
Overview Fabric
The Big Ideas ○ ○ ○ ○ Fabric
What is Information Flow? Fabric
Fabric Architecture Fabric
Security Model: Principals Fabric
Security Model: Principals Fabric
Security Model: Labels Fabric
Security Model: Labels cont. Fabric
Security Model: Labels cont. Fabric
Applications Fabric
Evaluation Results Fabric
Outline Outline
What Happened…. ○ Fabric Papers CSF’15, PLAS’14, POST’14, NSDI’14, PLDI’ 12, Oakland’12, CCS’11, CCS’10, Jed’s Thesis, SOSP’09 Today
Outline Outline
Two Approaches to Trustworthy Computing Conclusion
What should we trust? Conclusion
Recommend
More recommend