SlideShare a Scribd company logo
1 of 20
Presented by:
Prakash Ranjan
Panda
Regd.
No.:1205106018
4th sem, MCA
Guided by:
Ms. Rojalin
Mallick
Dept. of CSA
What is Palladium ?
Trustworthy Computing
Palladium’s Goal
Architecture of
Palladium
TPM
NEXUS
USES
CONCLUSION
REFERENCE
A set of hardware and software
extensions to make the PC more
trustworthy.
Today’s apps will still run just fine.
You can disable Palladium extensions if
you choose.
What exactly is trustworthy computing ?
 Trustworthy: worthy of confidence.
 Examples:
 Credit card numbers that can’t be stolen.
 Personal diary that can only be written and viewed by you or
people you choose.
 Someone is who she says she is.
 There are currently ad-hoc solutions for some of
these concerns, Palladium seeks to solve them all.
Applications ?
 Operating systems can programmatically subvert
applications.
Operating System ?
 Hardware can programmatically subvert operating
system.
Hardware ?
 Humans can subvert hardware, but not
programmatically.
 So we have to start off trusting the hardware.
Perform trusted operations
Span multiple computers with this
trust
Create dynamic trust policies
Allow anyone to authenticate these
policies
 Specifically, Palladium will
add four new security
features that increase the
trustworthiness of the
machine:
 Protected memory
 Attestation
 Sealed storage
 Secure input and output
 It primarily does this through
cryptographic keys and
App
OS
User
Kernel
 How do you preserve the flexibility and extensibility that
contributes so much to the entire PC ecosystem, while still
providing end users with a safe place to do important work?
 In particular, how can you keep anything secret, when
pluggable kernel components control the machine?
Agent
Agent
App
OS
User
Kernel
Standard
Trusted
Nexus
 The solution: subdivide the execution environment by adding
a new mode flag to the CPU.
 The CPU is either in “standard” mode or “trusted” mode.
 Pages of physical memory can be marked as “trusted.” Trusted
pages can only be accessed when the CPU is in trusted mode.
User
Kernel
App
OS
Standard
Trusted
Agent
Nexus
Agent
TPM
Pub/Pri Keys
Trusted
GPU
Trusted
USB Hub
 Agents also need to let the user enter secrets and to display
secrets to the user.
 Input is secured by a trusted USB ‘hub’ and mouse that carries
on a protected conversation with the nexus.
 Output is secured by a trusted GPU that carries on a crypto-
protected conversation with the nexus.
 This gives us “fingertip-to-eyeball” security.
Security Support Component (SSC)/
Trusted Platform Module(TPM)
New chip on the Motherboard
Curtained Memory
Accessible to those application to which it belongs
 Nexus
 (the kernel)
 shared source
 Nexus Computing Agent(NCA)
 (the applications)
 Trusted Platform Module
 also called SSC - Security
Support Component
 Stores hardware secret
key
 Base of trust
 Cryptographic co-
processor
 Essentially the kernel of an isolated software stack
 runs alongside the existing OS software stack.
 not underneath it
 Provides a limited set of applications and services for
applications, including sealed storage and attestation
functions.
 Special processes that work with nexus are called
“Agents”
 Can run different nexuses on a machine
 But only one nexus at a time
Palladium could be used to implement very
strong access controls on confidential
documents.
Governments and other entities would love this.
A corporation could set up its documents such
that they would only be readable on its PCs.
Documents could be set up with automatic
expiration dates.
 Palladium is a hardware as well as software-based
secure execution environment
 TPM is its hardware-based secure execution
environment.
 Palladium processes are isolated from each other by the hardware
 Palladium processes can store & retrieve secrets securely
 The nexus provides an execution environment and
security/crypto-services to hosted agents
 Hardware provides crypto services to the nexus
 Recursively, the nexus provides these same services to agents
running on top of it.
http://www.microsoft.com/PressPass/features/2002/jul02/0724palladiumwp.as
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/news/N
http://www.activewin.com/articles/2002/pd.html
http://vitanuova.loyalty.org/2002-07-03.html
http://www.epic.org/privacy/consumer/microsoft/palladium.html
http://www.extremetech.com/article2/0,3973,837726,00.asp
Microsoft Palladium

More Related Content

What's hot

Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
Upender Upr
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Sensor networks
Sensor networksSensor networks
Sensor networks
Marc Pous
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
harisri269
 

What's hot (20)

Cloud storage
Cloud storageCloud storage
Cloud storage
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Rain technology
Rain technologyRain technology
Rain technology
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Federated learning
Federated learningFederated learning
Federated learning
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Fog ppt
Fog pptFog ppt
Fog ppt
 

Viewers also liked

Wireless and Internet Security Principles
Wireless and Internet Security PrinciplesWireless and Internet Security Principles
Wireless and Internet Security Principles
pualoob
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
Ned Hayes
 
Jini network technology
Jini network technologyJini network technology
Jini network technology
Keerthi Thomas
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Viewers also liked (20)

Microsoft Palladium.
Microsoft Palladium.Microsoft Palladium.
Microsoft Palladium.
 
ngscb
ngscbngscb
ngscb
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction - Lecture 1 - Advanced Topics in Information Systems (WE-DINF-15...
Introduction - Lecture 1 - Advanced Topics in Information Systems (WE-DINF-15...Introduction - Lecture 1 - Advanced Topics in Information Systems (WE-DINF-15...
Introduction - Lecture 1 - Advanced Topics in Information Systems (WE-DINF-15...
 
Snort
SnortSnort
Snort
 
Wireless and Internet Security Principles
Wireless and Internet Security PrinciplesWireless and Internet Security Principles
Wireless and Internet Security Principles
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 
Jini technology
Jini technologyJini technology
Jini technology
 
LAMP (Loop Mediated Isothermal Amplification)
LAMP (Loop Mediated Isothermal Amplification)LAMP (Loop Mediated Isothermal Amplification)
LAMP (Loop Mediated Isothermal Amplification)
 
Jini network technology
Jini network technologyJini network technology
Jini network technology
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cryptography
CryptographyCryptography
Cryptography
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Lamp technology
Lamp technologyLamp technology
Lamp technology
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Microsoft Palladium

Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy Enterprise
DMIMarketing
 
V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paper
EMC
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
STO STRATEGY
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren
 

Similar to Microsoft Palladium (20)

Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy Enterprise
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paper
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
 
The Hidden Risks of Your Cloud Infrastructure.pptx
The Hidden Risks of Your Cloud Infrastructure.pptxThe Hidden Risks of Your Cloud Infrastructure.pptx
The Hidden Risks of Your Cloud Infrastructure.pptx
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.ppt
 
5 Ways to Keep Your Remote Desktop Secure
5 Ways to Keep Your Remote Desktop Secure5 Ways to Keep Your Remote Desktop Secure
5 Ways to Keep Your Remote Desktop Secure
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 

More from Suryakanta Rout (6)

Light Fidelity(Li-Fi) Technology
Light Fidelity(Li-Fi) TechnologyLight Fidelity(Li-Fi) Technology
Light Fidelity(Li-Fi) Technology
 
zForce Touch Screen Technology
zForce Touch Screen TechnologyzForce Touch Screen Technology
zForce Touch Screen Technology
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Li-Fi Technology
Li-Fi TechnologyLi-Fi Technology
Li-Fi Technology
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Microsoft Palladium

  • 1. Presented by: Prakash Ranjan Panda Regd. No.:1205106018 4th sem, MCA Guided by: Ms. Rojalin Mallick Dept. of CSA
  • 2. What is Palladium ? Trustworthy Computing Palladium’s Goal Architecture of Palladium TPM NEXUS USES CONCLUSION REFERENCE
  • 3. A set of hardware and software extensions to make the PC more trustworthy. Today’s apps will still run just fine. You can disable Palladium extensions if you choose. What exactly is trustworthy computing ?
  • 4.  Trustworthy: worthy of confidence.  Examples:  Credit card numbers that can’t be stolen.  Personal diary that can only be written and viewed by you or people you choose.  Someone is who she says she is.  There are currently ad-hoc solutions for some of these concerns, Palladium seeks to solve them all.
  • 5. Applications ?  Operating systems can programmatically subvert applications. Operating System ?  Hardware can programmatically subvert operating system. Hardware ?  Humans can subvert hardware, but not programmatically.  So we have to start off trusting the hardware.
  • 6. Perform trusted operations Span multiple computers with this trust Create dynamic trust policies Allow anyone to authenticate these policies
  • 7.  Specifically, Palladium will add four new security features that increase the trustworthiness of the machine:  Protected memory  Attestation  Sealed storage  Secure input and output  It primarily does this through cryptographic keys and
  • 8.
  • 9. App OS User Kernel  How do you preserve the flexibility and extensibility that contributes so much to the entire PC ecosystem, while still providing end users with a safe place to do important work?  In particular, how can you keep anything secret, when pluggable kernel components control the machine?
  • 10. Agent Agent App OS User Kernel Standard Trusted Nexus  The solution: subdivide the execution environment by adding a new mode flag to the CPU.  The CPU is either in “standard” mode or “trusted” mode.  Pages of physical memory can be marked as “trusted.” Trusted pages can only be accessed when the CPU is in trusted mode.
  • 11. User Kernel App OS Standard Trusted Agent Nexus Agent TPM Pub/Pri Keys Trusted GPU Trusted USB Hub  Agents also need to let the user enter secrets and to display secrets to the user.  Input is secured by a trusted USB ‘hub’ and mouse that carries on a protected conversation with the nexus.  Output is secured by a trusted GPU that carries on a crypto- protected conversation with the nexus.  This gives us “fingertip-to-eyeball” security.
  • 12. Security Support Component (SSC)/ Trusted Platform Module(TPM) New chip on the Motherboard Curtained Memory Accessible to those application to which it belongs
  • 13.  Nexus  (the kernel)  shared source  Nexus Computing Agent(NCA)  (the applications)
  • 14.  Trusted Platform Module  also called SSC - Security Support Component  Stores hardware secret key  Base of trust  Cryptographic co- processor
  • 15.
  • 16.  Essentially the kernel of an isolated software stack  runs alongside the existing OS software stack.  not underneath it  Provides a limited set of applications and services for applications, including sealed storage and attestation functions.  Special processes that work with nexus are called “Agents”  Can run different nexuses on a machine  But only one nexus at a time
  • 17. Palladium could be used to implement very strong access controls on confidential documents. Governments and other entities would love this. A corporation could set up its documents such that they would only be readable on its PCs. Documents could be set up with automatic expiration dates.
  • 18.  Palladium is a hardware as well as software-based secure execution environment  TPM is its hardware-based secure execution environment.  Palladium processes are isolated from each other by the hardware  Palladium processes can store & retrieve secrets securely  The nexus provides an execution environment and security/crypto-services to hosted agents  Hardware provides crypto services to the nexus  Recursively, the nexus provides these same services to agents running on top of it.