SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Secure	
  Server	
  Project	
  

Xen	
  Project	
  Developer	
  Summit	
  2013	
  
Adven9um	
  Labs	
  
Jason	
  Sonnek	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

1	
  
Outline	
  
I.  Mo9va9on,	
  Objec9ves	
  
II.  Threat	
  Landscape	
  
III.  Design	
  
IV.  Status	
  
V.  Roadmap	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

2	
  
Mo9va9on	
  
•  In	
  a	
  nutshell:	
  “Secure	
  Server	
  Mul9plexing”	
  
–  In	
  a	
  cloud	
  environment	
  
–  Mul9ple	
  tenants	
  

•  Goals:	
  
–  Ensure	
  data	
  and	
  processing	
  are	
  safe	
  from	
  co-­‐tenants	
  
–  Ensure	
  controls	
  on	
  informa9on	
  separa9on	
  and	
  flow	
  are	
  sa9sfied	
  

•  Today:	
  
–  Xen	
  hypervisor,	
  hardware-­‐assisted	
  virtualiza9on	
  provide	
  tools	
  necessary	
  to	
  
isolate	
  hardware	
  
–  Problem:	
  many	
  shared	
  components	
  in	
  dom0,	
  insufficient	
  isola9on	
  
–  The	
  easy	
  way	
  out:	
  
•  Dedicated	
  hardware	
  for	
  each	
  tenant	
  
•  Imprac9cal	
  when	
  there	
  are	
  a	
  large	
  number	
  of	
  tenants,	
  rela9onships	
  are	
  evolving	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

3	
  
Objec9ve	
  
Cloud	
  
Management	
  

Green	
  

Orange	
  

SecureServe	
  
Xen	
  

•  SecureServe	
  ideal	
  
– 
– 
– 
– 
– 

10/16/13	
  

Enables	
  mul9ple	
  tenants	
  to	
  share	
  a	
  single	
  pla[orm	
  securely	
  
High-­‐assurance,	
  isolated	
  so]ware	
  par99ons	
  
Enables	
  controlled	
  informa9on	
  sharing	
  between	
  tenants	
  
Supports	
  enterprise-­‐ready	
  management	
  
Low	
  cost	
  

©	
  Adven9um	
  Labs	
  2013	
  

4	
  
Current	
  State	
  
Green	
  
QEMU	
  
xapi	
  

XenStore	
  

Orange	
  

dom0	
  

netback	
  

blktap	
  

nic	
  

disk	
  

Xen	
  

•  Weakest	
  guest	
  is	
  the	
  weakest	
  link	
  in	
  the	
  system	
  

–  Guest	
  aaack	
  vector:	
  many	
  shared	
  components	
  in	
  dom0	
  
•  Device	
  emula9on,	
  virtual	
  devices,	
  toolstack,	
  XenStore	
  
•  Cross-­‐VM	
  side	
  channel	
  aaacks	
  

•  Cloud	
  management	
  provides	
  an	
  addi9onal	
  aaack	
  vector	
  
–  Users	
  must	
  be	
  able	
  to	
  manage	
  and	
  configure	
  their	
  VMs.	
  
–  XAPI:	
  	
  
•  Complex	
  (130K	
  LOC)	
  
•  Interfaces	
  with	
  many	
  other	
  components.	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

5	
  
Current	
  State	
  
Green	
  
QEMU	
  
xapi	
  

Orange	
  

Compliance	
  

XenStore	
  

dom0	
  

netback	
  

blktap	
  

nic	
  

disk	
  

Xen	
  

•  Desire	
  controlled	
  informa9on	
  sharing	
  between	
  tenants	
  
•  Inter-­‐VM	
  networking	
  
–  Can	
  define	
  “separate”	
  networks	
  in	
  dom0	
  
–  Separa9on	
  in	
  dom0	
  is	
  weaker	
  than	
  separa9on	
  provided	
  by	
  hypervisor	
  

•  Goal:	
  enable	
  high-­‐assurance	
  private	
  networks	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

6	
  
Threat	
  Landscape	
  
•  Recent	
  (2012-­‐13)	
  Xen-­‐tagged	
  CVE	
  vulnerabili9es	
  (tag	
  cloud	
  below)	
  
•  73	
  vulnerabili9es	
  represented,	
  some	
  with	
  mul9ple	
  poten9al	
  effects	
  
– 
– 
– 
– 
– 
– 

65	
  "guest",	
  	
  e.g.	
  "allows	
  local	
  guest	
  administrators	
  to"	
  	
  
8	
  TMEM	
  (transcendental	
  memory)	
  
4	
  "overflow"	
  	
  
4	
  QEMU	
  	
  
3	
  "drivers"	
  (all	
  in	
  reference	
  to	
  backends)	
  	
  
2	
  xenstore	
  	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

7	
  
Threat	
  Landscape	
  
•  Aaackers	
  target	
  toolstack,	
  hypervisor,	
  management	
  so]ware,	
  …	
  
with	
  varying	
  goals:	
  
–  Denial	
  of	
  Service	
  
–  Escala9on	
  of	
  Privilege	
  
–  Acquisi9on	
  of	
  Informa9on	
  

•  Vulnerability	
  types	
  on	
  the	
  radar:	
  	
  
– 
– 
– 
– 
– 
– 
– 

API	
  -­‐-­‐	
  arguments	
  not	
  adequately	
  sanity	
  checked	
  
Aspects	
  of	
  Intel/AMD	
  instruc9on	
  set	
  that	
  emulator	
  handles	
  incorrectly	
  
Failure	
  to	
  completely	
  and	
  correctly	
  check	
  permissions	
  	
  
Weakness	
  in	
  recovering	
  from	
  error	
  condi9ons	
  	
  
Exploitable	
  PCI	
  pass-­‐through	
  devices,	
  especially	
  bus	
  mastering	
  capable	
  ones	
  	
  
Logic	
  errors	
  that	
  can	
  be	
  triggered	
  by	
  unusual	
  condi9ons	
  	
  
Memory	
  leaks	
  or	
  similar	
  unbounded	
  resource	
  sinks	
  

	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

8	
  
Near-­‐Term	
  Project	
  Objec9ves	
  
•  Improve	
  security	
  posture	
  of	
  dom0	
  
– 
– 
– 
– 

Isolate	
  the	
  network	
  stack	
  
Isolate	
  the	
  storage	
  stack	
  
Isolate	
  the	
  device	
  model	
  (QEMU)	
  
Adapt	
  the	
  toolstack	
  as	
  necessary	
  to	
  support	
  this	
  configura9on	
  

•  Apply	
  well-­‐known	
  security	
  principles	
  
–  Secure	
  the	
  weak	
  links,	
  separate	
  privileges,	
  do	
  not	
  share	
  mechanisms	
  
(disaggrega9on)	
  
–  Grant	
  (and	
  enforce)	
  least	
  privilege	
  (hypervisor	
  MAC)	
  
–  Defense-­‐in-­‐depth	
  (aaesta9on)	
  

•  Establish	
  a	
  baseline	
  for	
  future	
  research	
  and	
  development	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

9	
  
Requirements	
  
•  Defined	
  a	
  set	
  of	
  high-­‐level	
  requirements	
  based	
  on	
  NIST	
  800.53	
  and	
  
CNSSI	
  1253:	
  
–  Categories:	
  Confiden9ality,	
  Integrity,	
  Access	
  Control,	
  Accountability,	
  Usability	
  

•  Examples:	
  
–  Informa7on	
  in	
  Shared	
  Resources:	
  The	
  system	
  must	
  prevent	
  unauthorized	
  and	
  
unintended	
  informa9on	
  transfers	
  via	
  shared	
  objects..	
  	
  
–  MAC	
  Policies:	
  The	
  system	
  must	
  use	
  mandatory	
  access	
  control	
  policies	
  to	
  
control	
  the	
  flow	
  of	
  informa9on	
  among	
  processing	
  domains.	
  
–  SoAware,	
  Firmware,	
  and	
  Hardware	
  Integrity:	
  The	
  system	
  should	
  support	
  
integrity	
  verifica9on	
  tools	
  to	
  detect	
  unauthorized	
  changes	
  to	
  selected	
  
so]ware,	
  firmware	
  and	
  hardware.	
  	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

10	
  
Dom0	
  Disaggrega9on	
  

nic	
  

disk	
  

xapi	
  

QEMU	
  

netbk	
  

blktap	
  

nic	
  

XenStore	
  

Storage	
  

QEMU
QEMU	
  

Network	
  

Storage	
  
blktap	
  

QEMU

Network	
  
netbk	
  

	
  	
  

Orange	
  
	
  	
  

Green	
  

disk	
  

dom0	
  
Xen	
  

Secure	
  weak	
  links,	
  separate	
  mechanisms	
  /	
  privileges	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

11	
  
Hypervisor	
  Mandatory	
  Access	
  Controls	
  

nic	
  

disk	
  

xapi	
  

XSM	
  

QEMU	
  

netbk	
  

blktap	
  

nic	
  

XenStore	
  

Storage	
  

QEMU
QEMU	
  

Network	
  

Storage	
  
blktap	
  

QEMU

Network	
  
netbk	
  

	
  	
  

Orange	
  
	
  	
  

Green	
  

disk	
  

dom0	
  
Xen	
  

Grant	
  and	
  enforce	
  least	
  privilege	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

12	
  
Isn’t	
  that	
  overkill?	
  

Green	
  

QEMU	
  

xapi	
  

Orange	
  

dom0	
  

XenStore	
  

netback	
  

blktap	
  

nic	
  

disk	
  

Xen	
  

Proposal:	
  Encrypt	
  orange	
  and	
  green	
  traffic	
  
	
  	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

13	
  
Isn’t	
  that	
  overkill?	
  
Green	
  

QEMU	
  

xapi	
  

Orange	
  

dom0	
  

XenStore	
  

netback	
  

blktap	
  

nic	
  

disk	
  

Xen	
  

Compromise	
  of	
  dom0	
  via	
  malicious	
  tenant	
  provides	
  
unfePered	
  access	
  to	
  memory!	
  
	
  	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

14	
  
Isola9ng	
  the	
  Weak(est)	
  Links	
  

nic	
  

disk	
  

xapi	
  

XSM	
  

QEMU	
  

netbk	
  

blktap	
  

nic	
  

XenStore	
  

Storage	
  

QEMU
QEMU	
  

Network	
  

Storage	
  
blktap	
  

QEMU

Network	
  
netbk	
  

	
  	
  

Orange	
  
	
  	
  

Green	
  

disk	
  

dom0	
  
Xen	
  

If	
  one	
  tenant	
  on	
  Secure	
  Server	
  is	
  compromised	
  ...	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

15	
  
Isola9ng	
  the	
  Weak(est)	
  Links	
  

nic	
  

disk	
  

xapi	
  

XSM	
  

QEMU	
  

netbk	
  

blktap	
  

nic	
  

XenStore	
  

Storage	
  

QEMU
QEMU	
  

Network	
  

Storage	
  
blktap	
  

QEMU

Network	
  
netbk	
  

	
  	
  

Orange	
  
	
  	
  

Green	
  

disk	
  

dom0	
  
Xen	
  

…	
  the	
  aPack	
  is	
  contained	
  because	
  the	
  compromised	
  tenant	
  
lacks	
  privileges	
  necessary	
  to	
  access	
  co-­‐tenant	
  resources.	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

16	
  
Isola9ng	
  the	
  Weak(est)	
  Links	
  

nic	
  

disk	
  

xapi	
  

XSM	
  

QEMU	
  

netbk	
  

blktap	
  

nic	
  

XenStore	
  

Storage	
  

QEMU
QEMU	
  

Network	
  

Storage	
  
blktap	
  

QEMU

Network	
  
netbk	
  

	
  	
  

Orange	
  
	
  	
  

Green	
  

disk	
  

dom0	
  
Xen	
  

Provides	
  stronger	
  data	
  confiden7ality	
  assurance	
  as	
  well	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

17	
  
Dynamic	
  Mandatory	
  Access	
  Controls	
  
Purple	
  

Green	
  
QEMU	
  
xapi	
  

XenStore	
  

Orange	
  

dom0	
  

netback	
  

blktap	
  

nic	
  

disk	
  

Xen	
  

•  Can	
  easily	
  define	
  a	
  sta9c	
  policy	
  for	
  mul9-­‐tenant	
  environments	
  
•  Not	
  good	
  enough	
  
–  Tenants	
  come	
  and	
  go	
  
–  Rela9onships	
  evolve	
  

•  How	
  can	
  we	
  support	
  a	
  dynamic	
  XSM	
  policy?	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

18	
  
TCB:	
  Trust,	
  but	
  verify	
  
•  Un9l	
  now,	
  assumed	
  a	
  trusted	
  compu9ng	
  base	
  that	
  includes	
  Xen	
  
and	
  the	
  hardware	
  
•  Don’t	
  really	
  intend	
  to	
  trust	
  these	
  things:	
  
–  Use	
  measured	
  launch	
  to	
  check	
  integrity	
  
–  Use	
  dynamic	
  aaesta9on	
  to	
  verify	
  run9me	
  integrity	
  
•  Especially	
  important	
  on	
  servers	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

19	
  
Knowledge	
  
(trust)	
  

Knowledge	
  
(trust)	
  

SRTM,	
  DRTM	
  and	
  Dynamic	
  Aaesta9on	
  
Core	
  
Root	
  
Trust	
  

Sta9c	
  Root	
  of	
  Trust	
  
Entropy	
  leads	
  to	
  decay	
  of	
   • Hardware?	
  
knowledge	
  of	
  system	
  state:	
  • Firmware?	
  
	
  
• Configura9on?	
  
• Drivers?	
  
9me	
  

Core	
  
Root	
  
Trust	
  

Gap	
  
Dynamic	
  
Launch	
  
Entry	
  

Dynamically	
  
Launched	
  
Measured	
  
Environment	
  
(e.g.,	
  tboot)	
  

Dynamic	
  Root	
  of	
  Trust	
  

9me	
  

AAer	
  ini7al	
  boot,	
  knowledge	
  of	
  system	
  
state	
  decays	
  with	
  7me	
  
10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

20	
  
Current	
  Status	
  
•  Started	
  with	
  XenServer	
  6.2	
  appliance	
  
–  Built	
  network	
  driver	
  domain	
  (working)	
  
•  openvswitch	
  or	
  bridged	
  networking	
  

–  Built	
  storage	
  driver	
  domain	
  (working)	
  	
  
•  iSCSI	
  and	
  SATA	
  controller	
  backend	
  

–  Developing	
  QEMU	
  stub	
  domain	
  
–  Defined	
  MAC	
  policy	
  for	
  a	
  specific	
  use	
  case;	
  verified,	
  validated	
  
•  Built	
  tools	
  for	
  genera9ng	
  sta9c	
  policies	
  based	
  on	
  high-­‐level	
  specifica9on	
  

•  Challenges	
  
–  Deducing	
  rela9onship	
  between	
  XAPI	
  and	
  Xen	
  constructs	
  
–  Adap9ng	
  toolstack	
  to	
  support	
  disaggregated	
  opera9on	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

21	
  
Roadmap	
  
•  Secure	
  inter-­‐VMcommunica9on	
  
–  Survey:	
  more	
  than	
  a	
  dozen	
  published	
  mechanisms	
  

•  More	
  fine-­‐grained	
  disaggrega9on	
  
–  XenAPI,	
  XenStore,	
  domain	
  builder	
  
–  Informed	
  by	
  prior	
  work:	
  Windsor,	
  Xoar,	
  Murray	
  et	
  al.,	
  Qubes,	
  …	
  

•  Service	
  VM	
  model	
  
–  Reduce	
  footprint,	
  maintain	
  generality	
  

•  Assess	
  scalability	
  
–  Per	
  tenant	
  sharing	
  

•  Iden9fy	
  future	
  R&D	
  challenges	
  
–  Migra9on	
  
–  Server	
  longevity	
  
–  High	
  availability	
  configura9ons	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

22	
  
Conclusion	
  
•  Secure	
  Server	
  Mul9plexing	
  
–  Ensure	
  data	
  and	
  processing	
  are	
  safe	
  from	
  co-­‐tenants	
  
–  Ensure	
  controls	
  on	
  informa9on	
  separa9on	
  and	
  flow	
  are	
  sa9sfied	
  

•  Building	
  a	
  baseline	
  prototype	
  	
  
–  By	
  drawing	
  on	
  past	
  dom0	
  disaggrega9on,	
  MAC	
  and	
  aaesta9on	
  R&D	
  
–  Targe9ng	
  EOY	
  2013	
  release	
  

•  Prototype	
  can	
  be	
  used	
  as	
  a	
  founda9on	
  for	
  future	
  R&D	
  
–  Phase	
  2:	
  iden9fy	
  outstanding	
  challenges	
  and	
  long-­‐term	
  R&D	
  roadmap	
  

•  Call	
  for	
  Par9cipa9on	
  
–  Collabora9ng	
  via	
  xs-­‐devel	
  mailing	
  list	
  
–  Feedback	
  welcome	
  

10/16/13	
  

©	
  Adven9um	
  Labs	
  2013	
  

23	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
Mega Launch Recap Slide Deck
Mega Launch Recap Slide DeckMega Launch Recap Slide Deck
Mega Launch Recap Slide DeckVarrow Inc.
 
emc vnx unisphere
emc vnx unisphereemc vnx unisphere
emc vnx unispherexigua_521
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopsolarisyougood
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualizationSisimon Soman
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny poolEMC Nederland
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
Securing and Managing the Oracle HTTP Server
Securing and Managing the Oracle HTTP ServerSecuring and Managing the Oracle HTTP Server
Securing and Managing the Oracle HTTP ServerSecureDBA
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functionsxKinAnx
 
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryCloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryTerell Jones
 

Was ist angesagt? (15)

Emc
EmcEmc
Emc
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
Mega Launch Recap Slide Deck
Mega Launch Recap Slide DeckMega Launch Recap Slide Deck
Mega Launch Recap Slide Deck
 
emc vnx unisphere
emc vnx unisphereemc vnx unisphere
emc vnx unisphere
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshop
 
EMC VNX
EMC VNXEMC VNX
EMC VNX
 
2009-dec02_EMC2
2009-dec02_EMC22009-dec02_EMC2
2009-dec02_EMC2
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualization
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny pool
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Securing and Managing the Oracle HTTP Server
Securing and Managing the Oracle HTTP ServerSecuring and Managing the Oracle HTTP Server
Securing and Managing the Oracle HTTP Server
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
VNX Overview
VNX Overview   VNX Overview
VNX Overview
 
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryCloud Back Up and Disaster Recovery
Cloud Back Up and Disaster Recovery
 

Andere mochten auch

4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquadJosh Howell
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTThe Linux Foundation
 
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...The Linux Foundation
 
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...The Linux Foundation
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 

Andere mochten auch (7)

4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
 
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
 
Network security
Network securityNetwork security
Network security
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Web Security
Web SecurityWeb Security
Web Security
 

Ähnlich wie XPDS13: SecureServe - A Multi-level Secure Server Virtualization Platform on Xen - Jason Sonnek, Adventium Labs

Nimble Storage - The Predicitive Multicloud Flash Fabric
Nimble Storage - The Predicitive Multicloud Flash FabricNimble Storage - The Predicitive Multicloud Flash Fabric
Nimble Storage - The Predicitive Multicloud Flash FabricVITO - Securitas
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
 
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center Alaeddine El Fawal
 
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...Cloud Native Day Tel Aviv
 
EMC & OpenStack: A View From Within
EMC & OpenStack: A View From WithinEMC & OpenStack: A View From Within
EMC & OpenStack: A View From WithinEMC
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptxAvi Networks
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Cloud concepts-and-technologies
Cloud concepts-and-technologiesCloud concepts-and-technologies
Cloud concepts-and-technologiesParag Patil
 
3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle CloudSimon Haslam
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
O C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docxO C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docx
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docxvannagoforth
 
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
O C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docxO C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docx
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docxdunhamadell
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbmsZaid Shabbir
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseEMC
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseEMC
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...SolarWinds
 

Ähnlich wie XPDS13: SecureServe - A Multi-level Secure Server Virtualization Platform on Xen - Jason Sonnek, Adventium Labs (20)

Nimble Storage - The Predicitive Multicloud Flash Fabric
Nimble Storage - The Predicitive Multicloud Flash FabricNimble Storage - The Predicitive Multicloud Flash Fabric
Nimble Storage - The Predicitive Multicloud Flash Fabric
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center
Alaeddine El Fawal DR Plan for Private-Cloud Based Data Center
 
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
 
EMC & OpenStack: A View From Within
EMC & OpenStack: A View From WithinEMC & OpenStack: A View From Within
EMC & OpenStack: A View From Within
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Cloud concepts-and-technologies
Cloud concepts-and-technologiesCloud concepts-and-technologies
Cloud concepts-and-technologies
 
3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
O C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docxO C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docx
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
 
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
O C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docxO C T O B E R  2 0 1 4      V O L .  5 7      N O .  1 0   .docx
O C T O B E R 2 0 1 4 V O L . 5 7 N O . 1 0 .docx
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 

Mehr von The Linux Foundation

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleThe Linux Foundation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderThe Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEThe Linux Foundation
 

Mehr von The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

XPDS13: SecureServe - A Multi-level Secure Server Virtualization Platform on Xen - Jason Sonnek, Adventium Labs

  • 1. Secure  Server  Project   Xen  Project  Developer  Summit  2013   Adven9um  Labs   Jason  Sonnek   10/16/13   ©  Adven9um  Labs  2013   1  
  • 2. Outline   I.  Mo9va9on,  Objec9ves   II.  Threat  Landscape   III.  Design   IV.  Status   V.  Roadmap   10/16/13   ©  Adven9um  Labs  2013   2  
  • 3. Mo9va9on   •  In  a  nutshell:  “Secure  Server  Mul9plexing”   –  In  a  cloud  environment   –  Mul9ple  tenants   •  Goals:   –  Ensure  data  and  processing  are  safe  from  co-­‐tenants   –  Ensure  controls  on  informa9on  separa9on  and  flow  are  sa9sfied   •  Today:   –  Xen  hypervisor,  hardware-­‐assisted  virtualiza9on  provide  tools  necessary  to   isolate  hardware   –  Problem:  many  shared  components  in  dom0,  insufficient  isola9on   –  The  easy  way  out:   •  Dedicated  hardware  for  each  tenant   •  Imprac9cal  when  there  are  a  large  number  of  tenants,  rela9onships  are  evolving   10/16/13   ©  Adven9um  Labs  2013   3  
  • 4. Objec9ve   Cloud   Management   Green   Orange   SecureServe   Xen   •  SecureServe  ideal   –  –  –  –  –  10/16/13   Enables  mul9ple  tenants  to  share  a  single  pla[orm  securely   High-­‐assurance,  isolated  so]ware  par99ons   Enables  controlled  informa9on  sharing  between  tenants   Supports  enterprise-­‐ready  management   Low  cost   ©  Adven9um  Labs  2013   4  
  • 5. Current  State   Green   QEMU   xapi   XenStore   Orange   dom0   netback   blktap   nic   disk   Xen   •  Weakest  guest  is  the  weakest  link  in  the  system   –  Guest  aaack  vector:  many  shared  components  in  dom0   •  Device  emula9on,  virtual  devices,  toolstack,  XenStore   •  Cross-­‐VM  side  channel  aaacks   •  Cloud  management  provides  an  addi9onal  aaack  vector   –  Users  must  be  able  to  manage  and  configure  their  VMs.   –  XAPI:     •  Complex  (130K  LOC)   •  Interfaces  with  many  other  components.   10/16/13   ©  Adven9um  Labs  2013   5  
  • 6. Current  State   Green   QEMU   xapi   Orange   Compliance   XenStore   dom0   netback   blktap   nic   disk   Xen   •  Desire  controlled  informa9on  sharing  between  tenants   •  Inter-­‐VM  networking   –  Can  define  “separate”  networks  in  dom0   –  Separa9on  in  dom0  is  weaker  than  separa9on  provided  by  hypervisor   •  Goal:  enable  high-­‐assurance  private  networks   10/16/13   ©  Adven9um  Labs  2013   6  
  • 7. Threat  Landscape   •  Recent  (2012-­‐13)  Xen-­‐tagged  CVE  vulnerabili9es  (tag  cloud  below)   •  73  vulnerabili9es  represented,  some  with  mul9ple  poten9al  effects   –  –  –  –  –  –  65  "guest",    e.g.  "allows  local  guest  administrators  to"     8  TMEM  (transcendental  memory)   4  "overflow"     4  QEMU     3  "drivers"  (all  in  reference  to  backends)     2  xenstore     10/16/13   ©  Adven9um  Labs  2013   7  
  • 8. Threat  Landscape   •  Aaackers  target  toolstack,  hypervisor,  management  so]ware,  …   with  varying  goals:   –  Denial  of  Service   –  Escala9on  of  Privilege   –  Acquisi9on  of  Informa9on   •  Vulnerability  types  on  the  radar:     –  –  –  –  –  –  –  API  -­‐-­‐  arguments  not  adequately  sanity  checked   Aspects  of  Intel/AMD  instruc9on  set  that  emulator  handles  incorrectly   Failure  to  completely  and  correctly  check  permissions     Weakness  in  recovering  from  error  condi9ons     Exploitable  PCI  pass-­‐through  devices,  especially  bus  mastering  capable  ones     Logic  errors  that  can  be  triggered  by  unusual  condi9ons     Memory  leaks  or  similar  unbounded  resource  sinks     10/16/13   ©  Adven9um  Labs  2013   8  
  • 9. Near-­‐Term  Project  Objec9ves   •  Improve  security  posture  of  dom0   –  –  –  –  Isolate  the  network  stack   Isolate  the  storage  stack   Isolate  the  device  model  (QEMU)   Adapt  the  toolstack  as  necessary  to  support  this  configura9on   •  Apply  well-­‐known  security  principles   –  Secure  the  weak  links,  separate  privileges,  do  not  share  mechanisms   (disaggrega9on)   –  Grant  (and  enforce)  least  privilege  (hypervisor  MAC)   –  Defense-­‐in-­‐depth  (aaesta9on)   •  Establish  a  baseline  for  future  research  and  development   10/16/13   ©  Adven9um  Labs  2013   9  
  • 10. Requirements   •  Defined  a  set  of  high-­‐level  requirements  based  on  NIST  800.53  and   CNSSI  1253:   –  Categories:  Confiden9ality,  Integrity,  Access  Control,  Accountability,  Usability   •  Examples:   –  Informa7on  in  Shared  Resources:  The  system  must  prevent  unauthorized  and   unintended  informa9on  transfers  via  shared  objects..     –  MAC  Policies:  The  system  must  use  mandatory  access  control  policies  to   control  the  flow  of  informa9on  among  processing  domains.   –  SoAware,  Firmware,  and  Hardware  Integrity:  The  system  should  support   integrity  verifica9on  tools  to  detect  unauthorized  changes  to  selected   so]ware,  firmware  and  hardware.     10/16/13   ©  Adven9um  Labs  2013   10  
  • 11. Dom0  Disaggrega9on   nic   disk   xapi   QEMU   netbk   blktap   nic   XenStore   Storage   QEMU QEMU   Network   Storage   blktap   QEMU Network   netbk       Orange       Green   disk   dom0   Xen   Secure  weak  links,  separate  mechanisms  /  privileges   10/16/13   ©  Adven9um  Labs  2013   11  
  • 12. Hypervisor  Mandatory  Access  Controls   nic   disk   xapi   XSM   QEMU   netbk   blktap   nic   XenStore   Storage   QEMU QEMU   Network   Storage   blktap   QEMU Network   netbk       Orange       Green   disk   dom0   Xen   Grant  and  enforce  least  privilege   10/16/13   ©  Adven9um  Labs  2013   12  
  • 13. Isn’t  that  overkill?   Green   QEMU   xapi   Orange   dom0   XenStore   netback   blktap   nic   disk   Xen   Proposal:  Encrypt  orange  and  green  traffic       10/16/13   ©  Adven9um  Labs  2013   13  
  • 14. Isn’t  that  overkill?   Green   QEMU   xapi   Orange   dom0   XenStore   netback   blktap   nic   disk   Xen   Compromise  of  dom0  via  malicious  tenant  provides   unfePered  access  to  memory!       10/16/13   ©  Adven9um  Labs  2013   14  
  • 15. Isola9ng  the  Weak(est)  Links   nic   disk   xapi   XSM   QEMU   netbk   blktap   nic   XenStore   Storage   QEMU QEMU   Network   Storage   blktap   QEMU Network   netbk       Orange       Green   disk   dom0   Xen   If  one  tenant  on  Secure  Server  is  compromised  ...   10/16/13   ©  Adven9um  Labs  2013   15  
  • 16. Isola9ng  the  Weak(est)  Links   nic   disk   xapi   XSM   QEMU   netbk   blktap   nic   XenStore   Storage   QEMU QEMU   Network   Storage   blktap   QEMU Network   netbk       Orange       Green   disk   dom0   Xen   …  the  aPack  is  contained  because  the  compromised  tenant   lacks  privileges  necessary  to  access  co-­‐tenant  resources.   10/16/13   ©  Adven9um  Labs  2013   16  
  • 17. Isola9ng  the  Weak(est)  Links   nic   disk   xapi   XSM   QEMU   netbk   blktap   nic   XenStore   Storage   QEMU QEMU   Network   Storage   blktap   QEMU Network   netbk       Orange       Green   disk   dom0   Xen   Provides  stronger  data  confiden7ality  assurance  as  well   10/16/13   ©  Adven9um  Labs  2013   17  
  • 18. Dynamic  Mandatory  Access  Controls   Purple   Green   QEMU   xapi   XenStore   Orange   dom0   netback   blktap   nic   disk   Xen   •  Can  easily  define  a  sta9c  policy  for  mul9-­‐tenant  environments   •  Not  good  enough   –  Tenants  come  and  go   –  Rela9onships  evolve   •  How  can  we  support  a  dynamic  XSM  policy?   10/16/13   ©  Adven9um  Labs  2013   18  
  • 19. TCB:  Trust,  but  verify   •  Un9l  now,  assumed  a  trusted  compu9ng  base  that  includes  Xen   and  the  hardware   •  Don’t  really  intend  to  trust  these  things:   –  Use  measured  launch  to  check  integrity   –  Use  dynamic  aaesta9on  to  verify  run9me  integrity   •  Especially  important  on  servers   10/16/13   ©  Adven9um  Labs  2013   19  
  • 20. Knowledge   (trust)   Knowledge   (trust)   SRTM,  DRTM  and  Dynamic  Aaesta9on   Core   Root   Trust   Sta9c  Root  of  Trust   Entropy  leads  to  decay  of   • Hardware?   knowledge  of  system  state:  • Firmware?     • Configura9on?   • Drivers?   9me   Core   Root   Trust   Gap   Dynamic   Launch   Entry   Dynamically   Launched   Measured   Environment   (e.g.,  tboot)   Dynamic  Root  of  Trust   9me   AAer  ini7al  boot,  knowledge  of  system   state  decays  with  7me   10/16/13   ©  Adven9um  Labs  2013   20  
  • 21. Current  Status   •  Started  with  XenServer  6.2  appliance   –  Built  network  driver  domain  (working)   •  openvswitch  or  bridged  networking   –  Built  storage  driver  domain  (working)     •  iSCSI  and  SATA  controller  backend   –  Developing  QEMU  stub  domain   –  Defined  MAC  policy  for  a  specific  use  case;  verified,  validated   •  Built  tools  for  genera9ng  sta9c  policies  based  on  high-­‐level  specifica9on   •  Challenges   –  Deducing  rela9onship  between  XAPI  and  Xen  constructs   –  Adap9ng  toolstack  to  support  disaggregated  opera9on   10/16/13   ©  Adven9um  Labs  2013   21  
  • 22. Roadmap   •  Secure  inter-­‐VMcommunica9on   –  Survey:  more  than  a  dozen  published  mechanisms   •  More  fine-­‐grained  disaggrega9on   –  XenAPI,  XenStore,  domain  builder   –  Informed  by  prior  work:  Windsor,  Xoar,  Murray  et  al.,  Qubes,  …   •  Service  VM  model   –  Reduce  footprint,  maintain  generality   •  Assess  scalability   –  Per  tenant  sharing   •  Iden9fy  future  R&D  challenges   –  Migra9on   –  Server  longevity   –  High  availability  configura9ons   10/16/13   ©  Adven9um  Labs  2013   22  
  • 23. Conclusion   •  Secure  Server  Mul9plexing   –  Ensure  data  and  processing  are  safe  from  co-­‐tenants   –  Ensure  controls  on  informa9on  separa9on  and  flow  are  sa9sfied   •  Building  a  baseline  prototype     –  By  drawing  on  past  dom0  disaggrega9on,  MAC  and  aaesta9on  R&D   –  Targe9ng  EOY  2013  release   •  Prototype  can  be  used  as  a  founda9on  for  future  R&D   –  Phase  2:  iden9fy  outstanding  challenges  and  long-­‐term  R&D  roadmap   •  Call  for  Par9cipa9on   –  Collabora9ng  via  xs-­‐devel  mailing  list   –  Feedback  welcome   10/16/13   ©  Adven9um  Labs  2013   23