SlideShare a Scribd company logo
1 of 65
Download to read offline
A practical approach for updating an
integrity-enforced operating system
Wojciech Ozga

TU Dresden
Do Le Quoc

TU Dresden
Christof Fetzer

TU Dresden
ACM/IFIP Middleware 2020
operating system
• con
fi
guration

• executables

• dynamic libraries
OSOS
integrity

monitoring system
remote

attestation
operating system
• con
fi
guration

• executables

• dynamic libraries
operating system
• con
fi
guration

• executables

• dynamic libraries
TPM


2.0IMA trusted
boot
integrity

monitoring system
remote

attestation
OSOS
integrity

monitoring system
remote

attestation
integrity 

violation !
operating system
• con
fi
guration

• executables

• dynamic libraries
TPM


2.0IMA trusted
bootrepository
software update
• con
fi
guration

• executables

• dynamic libraries
• con
fi
guration

• executables

• dynamic libraries
• con
fi
guration

• executables

• dynamic libraries
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
• con
fi
guration

• executables

• dynamic libraries
software
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
fi
le (C, H)


C - content


H - hash(C)


file1 = file2 ⇔ hash(file1) = hash(file2)
integrity measurement, veri
fi
cation, and enforcement
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
fi
le (C, H)


C - content


H - hash(C)


TPM


2.0IMA trusted
boot
integrity measurement, veri
fi
cation, and enforcement
fi
le


(C, H)

verify H = H correct
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
no update
fi
le (C, H)


C - content


H - hash(C)


no update
fi
le


(C, H)

fi
le


(C’’, H’’)


verify H = H correct
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
fi
le (C, H)


C - content


H - hash(C)


integrity measurement, veri
fi
cation, and enforcement
modi
fi
es 

fi
le’s content
no update
fi
le


(C, H)

fi
le


(C’’, H’’)


verify
verify H’’ ≠ H violation

(true positive)
H = H correct
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
fi
le (C, H)


C - content


H - hash(C)


integrity measurement, veri
fi
cation, and enforcement
modi
fi
es 

fi
le’s content
integrity measurement, veri
fi
cation, and enforcement
no update
fi
le


(C, H)

fi
le


(C’’, H’’)


verify
verify H’’ ≠ H violation

(true positive)
H = H correct
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
update
fi
le


(C’, H’)


fi
le (C, H)


C - content


H - hash(C)


modi
fi
es 

fi
le’s content
integrity measurement, veri
fi
cation, and enforcement
no update
fi
le


(C, H)

modi
fi
es 

fi
le’s content
fi
le


(C’’, H’’)


verify
verify H’’ ≠ H violation

(true positive)
H = H correct
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
update
fi
le


(C’, H’)


verify H’ ≠ H violation

(false positive)
fi
le (C, H)


C - content


H - hash(C)


modi
fi
es 

fi
le’s content
integrity measurement, veri
fi
cation, and enforcement
no update
fi
le


(C, H)

fi
le


(C’’, H’’)


verify
verify
H = H correct
H’’ ≠ H violation

(true positive)
fi
le contents of executables, 

con
fi
guration, dynamic libraries
-Software


state (C)


-
Integrity check by 

monitoring systemverify - Adversary
update
fi
le


(C’, H’)


verify H’ ≠ H violation

(false positive)
the problem addressed in this paper
fi
le (C, H)


C - content


H - hash(C)


- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
software package:

apache2-2.4.46.apk
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
software package:

apache2-2.4.46.apk
OSOS


OS


OS
OSOS
package manager


OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
install


OS
package manager
software package:

apache2-2.4.46.apk
OSOS
package manager


OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
repository
software package:

apache2-2.4.46.apk
OSOS
package manager


OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
install
software package:

apache2-2.4.46.apk
OSOS
package manager


OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
install
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
TPM


2.0
extend
measure
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
repository
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation


integrity-enforced OS
TPM


2.0
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Trusted Software 

Repository (TSR)
repository
trusted software 

repository (TSR)
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Trusted Software 

Repository (TSR)
repository
trusted software 

repository (TSR)


integrity-enforced OS
repository
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Trusted Software 

Repository (TSR)
repository
trusted software 

repository (TSR)
sanitization mechanism
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Trusted Software 

Repository (TSR)
Trusted Execution Environment
repository
trusted software 

repository (TSR)
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Trusted Software 

Repository (TSR)
Trusted Execution Environment
repository
trusted software 

repository (TSR)
Intel SGX
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Intel SGX
trusted software 

repository (TSR)
mirror #1
mirror #2
mirror #3
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Intel SGX
trusted software 

repository (TSR)
mirror #1
software package:

apache-1.0.0.apk
apache-1.0.0
mirror #2
apache2-2.4.46
mirror #3
apache2-2.4.46
replay attack
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Intel SGX
trusted software 

repository (TSR)
mirror #1
apache is up to date
apache2-2.4.46
mirror #2
apache3-3.0.1
mirror #3
apache3-3.0.1
freeze attack
OSOS
package manager


integrity-enforced OS
- sanitization process- data
fl
ow -
fi
lesystem- TSR private signing key - TSR public signing key
download

packages
install
TPM


2.0
measure
integrity

monitoring system
remote

attestation
Intel SGX
trusted software 

repository (TSR)
quorum
mirror #1
mirror #2
mirror #3
apache-1.0.0
apache2-2.4.46
apache2-2.4.46
software package:

apache2-2.4.46
Sanitization
A mechanism inside TSR that modi
fi
es packages to make them safe to be installed in
the integrity-enforced OS. Sanitization

• modi
fi
es installation scripts

• predicts OS con
fi
guration

• issues digital signatures
software package
package header
package control
package contents
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
software package digital signature: 011011…010101
package header
package control
package contents
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
software package certi
fi
es 

authenticity 

and 

integrity
digital signature: 011011…010101
package header
package control
package contents
meta-information:

name: “package”, 

version: “0.1”, 

dependencies: “openssl”,

…
pre/post installation & update scripts
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
software package certi
fi
es 

authenticity 

and 

integrity
digital signature: 011011…010101
meta-information:

name: “package”, 

version: “0.1”, 

dependencies: “openssl”,

hash: ‘c7a9f84bb5ac…987cce’
pre/post installation & update scripts
software-speci
fi
c
fi
les
certi
fi
es 

integrity
package header
package control
package contents
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
software package certi
fi
es 

authenticity 

and 

integrity
digital signature: 011011…010101
meta-information:

name: “package”, 

version: “0.1”, 

dependencies: “openssl”,

hash: ‘c7a9f84bb5ac…987cce’
pre/post installation & update scripts
certi
fi
es 

integrity
package header
package control
package contents
software-speci
fi
c
fi
lessoftware-speci
fi
c
fi
les
software package certi
fi
es 

authenticity 

and 

integrity
digital signature: 011011…010101
meta-information:

name: “package”, 

version: “0.1”, 

dependencies: “openssl”,

hash: ‘c7a9f84bb5ac…987cce’
software-speci
fi
c
fi
les
certi
fi
es 

integrity
package header
package control
package contents
pre/post installation & update scripts
con
fi
guration
fi
les, 

executables, libraries
-
provided by 

software maintainers
provided by OS 

distribution community
- -
pre/post installation & update scripts
Number of packages with and without custom con
fi
guration scripts in Alpine Linux main and community repositories. 

Some packages (Safe= ) contain scripts that break OS integrity
Operations performed by installation scripts located in software packages in Alpine Linux repositories. Some operations (Safe= ) break OS integrity. The last column ("TSR")
indicates which operations are safe after the sanitization. Filesystem changes - add/remove/modify folders, symbolic links, and their permissions. Empty scripts - conditional
checks, display information.
/etc/shadow


root:$6$UmJDHYmY80…18206:0:::::


bin:!::0:::::


daemon:!::0:::::
/etc/passwd


root:x:0:0:root:/root:/bin/ash


bin:x:1:1:bin:/bin:/sbin/nologin


daemon:x:2:2:daemon:/sbin:/sbin/
nologin
/etc/group


root:x:0:root


bin:x:1:root,bin,daemon


daemon:x:2:root,bin,daemon
Sanitization
1 scan all scripts in all packages
Sanitization
1 scan all scripts in all packages
2 extract all user/group creation commands
Sanitization
1 scan all scripts in all packages
2 extract all user/group creation commands
3 predict con
fi
guration after executing all commands
Sanitization
1 scan all scripts in all packages
2 extract all user/group creation commands
3 predict con
fi
guration after executing all commands
4 issue digital signatures of all
fi
les and predicted con
fi
guration
fi
les
Sanitization
1 scan all scripts in all packages
2 extract all user/group creation commands
5 modify all scripts so they:
3 predict con
fi
guration after executing all commands
4 issue digital signatures of all
fi
les and predicted con
fi
guration
fi
les
Sanitization
1 scan all scripts in all packages
2 extract all user/group creation commands
5 modify all scripts so they:
5a execute commands in the same order
5b install digital signatures
3 predict con
fi
guration after executing all commands
4 issue digital signatures of all
fi
les and predicted con
fi
guration
fi
les
Evaluation
• Time to sanitize a single package
• The performance overhead of tolerating compromised mirrors
• Time to sanitize all packages

• Main factors driving the sanitization time

• Impact of sanitization on the repository size

• Package access latency with pre-caching of sanitized packages

• End-to-end latency of software update

• The performance overhead of executing TSR inside SGX
see the paper

for more results
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]lower is
better
How much time does it take to sanitize a single package?
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]lower is
better
How much time does it take to sanitize a single package?
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
How much time does it take to sanitize a single package?
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
percentiles:

95th



75th 

50th

25th

5th
percentiles:

5th 25th 50th 75th 95th
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
EPC paging
percentiles:

95th



75th 

50th

25th

5th
percentiles:

5th 25th 50th 75th 95th
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
Total time to sanitize all


pre-downloaded packages:




13 minutes


percentiles:

95th



75th 

50th

25th

5th
percentiles:

5th 25th 50th 75th 95th
101
102
103
104
10−2
10−1
100
101
Sanitization time [s]
Numberoffilesinsidepackage
Exceeds EPC
No Yes
0.1 1 10 100
uncompressed package size [MB]
In practice, only a subset of
packages needs to be sanitized
between new update releases


percentiles:

95th



75th 

50th

25th

5th
percentiles:

5th 25th 50th 75th 95th
what is the overhead of tolerating compromised mirrors?
what is the overhead of tolerating compromised mirrors?
what is the overhead of tolerating compromised mirrors?
Latency of downloading the repository index from TSR. TSR instance is deployed in Europe.
lower is
better
Latency of downloading the repository index from TSR. TSR instance is deployed in Europe.
lower is
better
Latency of downloading the repository index from TSR. TSR instance is deployed in Europe.
lower is
better
Trusted software repository:

• enables software updates for integrity-enforced OS

• introduces the sanitization process that allows supporting 99.76% of packages
available in the Alpine Linux repository

• tolerates a minority of software repository mirrors exhibiting Byzantine behavior
Summary
Summary
Thank you


wojciech.ozga@tu-dresden.de
Trusted software repository:

• enables software updates for integrity-enforced OS

• introduces the sanitization process that allows supporting 99.76% of packages
available in the Alpine Linux repository

• tolerates a minority of software repository mirrors exhibiting Byzantine behavior

More Related Content

What's hot

High Availability Server with DRBD in linux
High Availability Server with DRBD in linuxHigh Availability Server with DRBD in linux
High Availability Server with DRBD in linuxAli Rachman
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package managementAcácio Oliveira
 
RPM: Speed up your deploy
RPM: Speed up your deployRPM: Speed up your deploy
RPM: Speed up your deployfcrippa
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2Hell19
 
Recommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityRecommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityHTS Hosting
 
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی Mohammad Reza Kamalifard
 
Systematic integration of millions of peptidoform evidences into Ensembl and ...
Systematic integration of millions of peptidoform evidences into Ensembl and ...Systematic integration of millions of peptidoform evidences into Ensembl and ...
Systematic integration of millions of peptidoform evidences into Ensembl and ...Yasset Perez-Riverol
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questionsTeja Bheemanapally
 
How To Install and Configure Salt Master on Ubuntu
How To Install and Configure Salt Master on UbuntuHow To Install and Configure Salt Master on Ubuntu
How To Install and Configure Salt Master on UbuntuVCP Muthukrishna
 
101 3.4 use streams, pipes and redirects v2
101 3.4 use streams, pipes and redirects v2101 3.4 use streams, pipes and redirects v2
101 3.4 use streams, pipes and redirects v2Acácio Oliveira
 
How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7VCP Muthukrishna
 
Component pack 6006 install guide
Component pack 6006 install guideComponent pack 6006 install guide
Component pack 6006 install guideRoberto Boccadoro
 
Linux Server Hardening - Steps by Steps
Linux Server Hardening - Steps by StepsLinux Server Hardening - Steps by Steps
Linux Server Hardening - Steps by StepsSunil Paudel
 
How to Configure OpenFiler for NFS Share
How to Configure OpenFiler for NFS ShareHow to Configure OpenFiler for NFS Share
How to Configure OpenFiler for NFS ShareVCP Muthukrishna
 

What's hot (20)

High Availability Server with DRBD in linux
High Availability Server with DRBD in linuxHigh Availability Server with DRBD in linux
High Availability Server with DRBD in linux
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
 
RPM: Speed up your deploy
RPM: Speed up your deployRPM: Speed up your deploy
RPM: Speed up your deploy
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
 
Recommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityRecommended Software and Modifications for Server Security
Recommended Software and Modifications for Server Security
 
Mysql56 replication
Mysql56 replicationMysql56 replication
Mysql56 replication
 
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی
اسلاید ارائه سوم جلسه ۱۰ کلاس پایتون برای هکر های قانونی
 
Systematic integration of millions of peptidoform evidences into Ensembl and ...
Systematic integration of millions of peptidoform evidences into Ensembl and ...Systematic integration of millions of peptidoform evidences into Ensembl and ...
Systematic integration of millions of peptidoform evidences into Ensembl and ...
 
Unix executable buffer overflow
Unix executable buffer overflowUnix executable buffer overflow
Unix executable buffer overflow
 
RPM (LINUX)
RPM (LINUX)RPM (LINUX)
RPM (LINUX)
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questions
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
How To Install and Configure Salt Master on Ubuntu
How To Install and Configure Salt Master on UbuntuHow To Install and Configure Salt Master on Ubuntu
How To Install and Configure Salt Master on Ubuntu
 
101 3.4 use streams, pipes and redirects v2
101 3.4 use streams, pipes and redirects v2101 3.4 use streams, pipes and redirects v2
101 3.4 use streams, pipes and redirects v2
 
How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7
 
Component pack 6006 install guide
Component pack 6006 install guideComponent pack 6006 install guide
Component pack 6006 install guide
 
Linux Server Hardening - Steps by Steps
Linux Server Hardening - Steps by StepsLinux Server Hardening - Steps by Steps
Linux Server Hardening - Steps by Steps
 
Install telnet Linux
Install telnet LinuxInstall telnet Linux
Install telnet Linux
 
How to Configure OpenFiler for NFS Share
How to Configure OpenFiler for NFS ShareHow to Configure OpenFiler for NFS Share
How to Configure OpenFiler for NFS Share
 
Cent os 5 ssh
Cent os 5 sshCent os 5 ssh
Cent os 5 ssh
 

Similar to A practical approach for updating an integrity-enforced operating system

Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOps
Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOpsMake stateful apps in Kubernetes a no brainer with Pure Storage and GitOps
Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOpsWeaveworks
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
Getting started with CFEngine - Webinar
Getting started with CFEngine - WebinarGetting started with CFEngine - Webinar
Getting started with CFEngine - WebinarCFEngine
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comAlexander Leonov
 
Digital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryDigital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryInfocyte
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSECVic Hargrave
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationOlehLevytskyi1
 
The Linux Audit Framework
The Linux Audit FrameworkThe Linux Audit Framework
The Linux Audit FrameworkGary Smith
 
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni Ondrej Holecek
 
Getting Started With CFEngine - Updated Version
Getting Started With CFEngine - Updated VersionGetting Started With CFEngine - Updated Version
Getting Started With CFEngine - Updated VersionCFEngine
 
Introduction into Cloud Foundry and Bosh | anynines
Introduction into Cloud Foundry and Bosh | anyninesIntroduction into Cloud Foundry and Bosh | anynines
Introduction into Cloud Foundry and Bosh | anyninesanynines GmbH
 
Pre-Compliance Accreditation Tool for Python
Pre-Compliance Accreditation Tool for PythonPre-Compliance Accreditation Tool for Python
Pre-Compliance Accreditation Tool for PythonJustin Dierking
 
Continuous Security
Continuous SecurityContinuous Security
Continuous SecuritySysdig
 
Industrializing the creation of machine images and Docker containers for clou...
Industrializing the creation of machine images and Docker containers for clou...Industrializing the creation of machine images and Docker containers for clou...
Industrializing the creation of machine images and Docker containers for clou...OW2
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Softwaredefconmoscow
 
Jump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & GithubJump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & Githubhubx
 
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesCI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesSysdig
 

Similar to A practical approach for updating an integrity-enforced operating system (20)

Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOps
Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOpsMake stateful apps in Kubernetes a no brainer with Pure Storage and GitOps
Make stateful apps in Kubernetes a no brainer with Pure Storage and GitOps
 
信息安全监控
信息安全监控信息安全监控
信息安全监控
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
Getting started with CFEngine - Webinar
Getting started with CFEngine - WebinarGetting started with CFEngine - Webinar
Getting started with CFEngine - Webinar
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.com
 
Digital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryDigital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - January
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
 
The Linux Audit Framework
The Linux Audit FrameworkThe Linux Audit Framework
The Linux Audit Framework
 
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
 
Getting Started With CFEngine - Updated Version
Getting Started With CFEngine - Updated VersionGetting Started With CFEngine - Updated Version
Getting Started With CFEngine - Updated Version
 
Introduction into Cloud Foundry and Bosh | anynines
Introduction into Cloud Foundry and Bosh | anyninesIntroduction into Cloud Foundry and Bosh | anynines
Introduction into Cloud Foundry and Bosh | anynines
 
Pre-Compliance Accreditation Tool for Python
Pre-Compliance Accreditation Tool for PythonPre-Compliance Accreditation Tool for Python
Pre-Compliance Accreditation Tool for Python
 
Continuous Security
Continuous SecurityContinuous Security
Continuous Security
 
Industrializing the creation of machine images and Docker containers for clou...
Industrializing the creation of machine images and Docker containers for clou...Industrializing the creation of machine images and Docker containers for clou...
Industrializing the creation of machine images and Docker containers for clou...
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 
Jump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & GithubJump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & Github
 
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesCI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
 

More from LEGATO project

Scrooge Attack: Undervolting ARM Processors for Profit
Scrooge Attack: Undervolting ARM Processors for ProfitScrooge Attack: Undervolting ARM Processors for Profit
Scrooge Attack: Undervolting ARM Processors for ProfitLEGATO project
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsLEGATO project
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworkLEGATO project
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...LEGATO project
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGATO project
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edgeLEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGATO project
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGATO project
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGATO project
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGATO project
 
TZ4Fabric: Executing Smart Contracts with ARM TrustZone
TZ4Fabric: Executing Smart Contracts with ARM TrustZoneTZ4Fabric: Executing Smart Contracts with ARM TrustZone
TZ4Fabric: Executing Smart Contracts with ARM TrustZoneLEGATO project
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingLEGATO project
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edgeLEGATO project
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyLEGATO project
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...LEGATO project
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsLEGATO project
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingLEGATO project
 

More from LEGATO project (20)

Scrooge Attack: Undervolting ARM Processors for Profit
Scrooge Attack: Undervolting ARM Processors for ProfitScrooge Attack: Undervolting ARM Processors for Profit
Scrooge Attack: Undervolting ARM Processors for Profit
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use Case
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edge
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
 
LEGaTO Integration
LEGaTO IntegrationLEGaTO Integration
LEGaTO Integration
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming Models
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack Runtimes
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous Hardware
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing Workshop
 
TZ4Fabric: Executing Smart Contracts with ARM TrustZone
TZ4Fabric: Executing Smart Contracts with ARM TrustZoneTZ4Fabric: Executing Smart Contracts with ARM TrustZone
TZ4Fabric: Executing Smart Contracts with ARM TrustZone
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow Computing
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edge
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
 

Recently uploaded

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 

Recently uploaded (20)

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 

A practical approach for updating an integrity-enforced operating system

  • 1. A practical approach for updating an integrity-enforced operating system Wojciech Ozga TU Dresden Do Le Quoc TU Dresden Christof Fetzer TU Dresden ACM/IFIP Middleware 2020
  • 2. operating system • con fi guration • executables • dynamic libraries
  • 3. OSOS integrity monitoring system remote
 attestation operating system • con fi guration • executables • dynamic libraries
  • 4. operating system • con fi guration • executables • dynamic libraries TPM 2.0IMA trusted boot integrity monitoring system remote
 attestation
  • 5. OSOS integrity monitoring system remote
 attestation integrity violation ! operating system • con fi guration • executables • dynamic libraries TPM 2.0IMA trusted bootrepository software update
  • 6. • con fi guration • executables • dynamic libraries • con fi guration • executables • dynamic libraries • con fi guration • executables • dynamic libraries fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary • con fi guration • executables • dynamic libraries software
  • 7. fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary fi le (C, H) C - content H - hash(C) 
 file1 = file2 ⇔ hash(file1) = hash(file2)
  • 8. integrity measurement, veri fi cation, and enforcement fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary fi le (C, H) C - content H - hash(C) 
 TPM 2.0IMA trusted boot
  • 9. integrity measurement, veri fi cation, and enforcement fi le (C, H)
 verify H = H correct fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary no update fi le (C, H) C - content H - hash(C) 

  • 10. no update fi le (C, H)
 fi le (C’’, H’’) 
 verify H = H correct fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary fi le (C, H) C - content H - hash(C) 
 integrity measurement, veri fi cation, and enforcement modi fi es 
 fi le’s content
  • 11. no update fi le (C, H)
 fi le (C’’, H’’) 
 verify verify H’’ ≠ H violation
 (true positive) H = H correct fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary fi le (C, H) C - content H - hash(C) 
 integrity measurement, veri fi cation, and enforcement modi fi es 
 fi le’s content
  • 12. integrity measurement, veri fi cation, and enforcement no update fi le (C, H)
 fi le (C’’, H’’) 
 verify verify H’’ ≠ H violation
 (true positive) H = H correct fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary update fi le (C’, H’) 
 fi le (C, H) C - content H - hash(C) 
 modi fi es 
 fi le’s content
  • 13. integrity measurement, veri fi cation, and enforcement no update fi le (C, H)
 modi fi es 
 fi le’s content fi le (C’’, H’’) 
 verify verify H’’ ≠ H violation
 (true positive) H = H correct fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary update fi le (C’, H’) 
 verify H’ ≠ H violation
 (false positive) fi le (C, H) C - content H - hash(C) 

  • 14. modi fi es 
 fi le’s content integrity measurement, veri fi cation, and enforcement no update fi le (C, H)
 fi le (C’’, H’’) 
 verify verify H = H correct H’’ ≠ H violation
 (true positive) fi le contents of executables, 
 con fi guration, dynamic libraries -Software state (C) 
 - Integrity check by 
 monitoring systemverify - Adversary update fi le (C’, H’) 
 verify H’ ≠ H violation
 (false positive) the problem addressed in this paper fi le (C, H) C - content H - hash(C) 

  • 15. - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository
  • 16. - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository software package: apache2-2.4.46.apk
  • 17. - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository software package: apache2-2.4.46.apk OSOS 
 OS 
 OS
  • 18. OSOS package manager 
 OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository install 
 OS package manager software package: apache2-2.4.46.apk
  • 19. OSOS package manager 
 OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages repository software package: apache2-2.4.46.apk
  • 20. OSOS package manager 
 OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository install software package: apache2-2.4.46.apk
  • 21. OSOS package manager 
 OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository install
  • 22. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository TPM 2.0 extend measure
  • 23. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key repository install TPM 2.0 measure integrity monitoring system remote
 attestation 
 integrity-enforced OS TPM 2.0
  • 24. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key install TPM 2.0 measure integrity monitoring system remote
 attestation Trusted Software Repository (TSR) repository trusted software repository (TSR)
  • 25. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key install TPM 2.0 measure integrity monitoring system remote
 attestation Trusted Software Repository (TSR) repository trusted software repository (TSR) 
 integrity-enforced OS repository
  • 26. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Trusted Software Repository (TSR) repository trusted software repository (TSR) sanitization mechanism
  • 27. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Trusted Software Repository (TSR) Trusted Execution Environment repository trusted software repository (TSR)
  • 28. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Trusted Software Repository (TSR) Trusted Execution Environment repository trusted software repository (TSR) Intel SGX
  • 29. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Intel SGX trusted software repository (TSR) mirror #1 mirror #2 mirror #3
  • 30. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Intel SGX trusted software repository (TSR) mirror #1 software package: apache-1.0.0.apk apache-1.0.0 mirror #2 apache2-2.4.46 mirror #3 apache2-2.4.46 replay attack
  • 31. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Intel SGX trusted software repository (TSR) mirror #1 apache is up to date apache2-2.4.46 mirror #2 apache3-3.0.1 mirror #3 apache3-3.0.1 freeze attack
  • 32. OSOS package manager 
 integrity-enforced OS - sanitization process- data fl ow - fi lesystem- TSR private signing key - TSR public signing key download
 packages install TPM 2.0 measure integrity monitoring system remote
 attestation Intel SGX trusted software repository (TSR) quorum mirror #1 mirror #2 mirror #3 apache-1.0.0 apache2-2.4.46 apache2-2.4.46 software package: apache2-2.4.46
  • 33. Sanitization A mechanism inside TSR that modi fi es packages to make them safe to be installed in the integrity-enforced OS. Sanitization • modi fi es installation scripts • predicts OS con fi guration • issues digital signatures
  • 34. software package package header package control package contents con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - -
  • 35. software package digital signature: 011011…010101 package header package control package contents con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - -
  • 36. software package certi fi es 
 authenticity 
 and 
 integrity digital signature: 011011…010101 package header package control package contents meta-information: name: “package”, version: “0.1”, dependencies: “openssl”, … pre/post installation & update scripts con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - -
  • 37. software package certi fi es 
 authenticity 
 and 
 integrity digital signature: 011011…010101 meta-information: name: “package”, version: “0.1”, dependencies: “openssl”, hash: ‘c7a9f84bb5ac…987cce’ pre/post installation & update scripts software-speci fi c fi les certi fi es 
 integrity package header package control package contents con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - -
  • 38. con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - - software package certi fi es 
 authenticity 
 and 
 integrity digital signature: 011011…010101 meta-information: name: “package”, version: “0.1”, dependencies: “openssl”, hash: ‘c7a9f84bb5ac…987cce’ pre/post installation & update scripts certi fi es 
 integrity package header package control package contents software-speci fi c fi lessoftware-speci fi c fi les
  • 39. software package certi fi es 
 authenticity 
 and 
 integrity digital signature: 011011…010101 meta-information: name: “package”, version: “0.1”, dependencies: “openssl”, hash: ‘c7a9f84bb5ac…987cce’ software-speci fi c fi les certi fi es 
 integrity package header package control package contents pre/post installation & update scripts con fi guration fi les, 
 executables, libraries - provided by 
 software maintainers provided by OS 
 distribution community - - pre/post installation & update scripts
  • 40. Number of packages with and without custom con fi guration scripts in Alpine Linux main and community repositories. 
 Some packages (Safe= ) contain scripts that break OS integrity
  • 41. Operations performed by installation scripts located in software packages in Alpine Linux repositories. Some operations (Safe= ) break OS integrity. The last column ("TSR") indicates which operations are safe after the sanitization. Filesystem changes - add/remove/modify folders, symbolic links, and their permissions. Empty scripts - conditional checks, display information.
  • 43. Sanitization 1 scan all scripts in all packages
  • 44. Sanitization 1 scan all scripts in all packages 2 extract all user/group creation commands
  • 45. Sanitization 1 scan all scripts in all packages 2 extract all user/group creation commands 3 predict con fi guration after executing all commands
  • 46. Sanitization 1 scan all scripts in all packages 2 extract all user/group creation commands 3 predict con fi guration after executing all commands 4 issue digital signatures of all fi les and predicted con fi guration fi les
  • 47. Sanitization 1 scan all scripts in all packages 2 extract all user/group creation commands 5 modify all scripts so they: 3 predict con fi guration after executing all commands 4 issue digital signatures of all fi les and predicted con fi guration fi les
  • 48. Sanitization 1 scan all scripts in all packages 2 extract all user/group creation commands 5 modify all scripts so they: 5a execute commands in the same order 5b install digital signatures 3 predict con fi guration after executing all commands 4 issue digital signatures of all fi les and predicted con fi guration fi les
  • 49. Evaluation • Time to sanitize a single package • The performance overhead of tolerating compromised mirrors • Time to sanitize all packages • Main factors driving the sanitization time • Impact of sanitization on the repository size • Package access latency with pre-caching of sanitized packages • End-to-end latency of software update • The performance overhead of executing TSR inside SGX see the paper
 for more results
  • 50. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB]lower is better How much time does it take to sanitize a single package?
  • 51. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB]lower is better How much time does it take to sanitize a single package?
  • 52. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB] How much time does it take to sanitize a single package?
  • 54. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB] percentiles: 95th
 
 75th 50th 25th 5th percentiles: 5th 25th 50th 75th 95th
  • 55. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB] EPC paging percentiles: 95th
 
 75th 50th 25th 5th percentiles: 5th 25th 50th 75th 95th
  • 56. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB] Total time to sanitize all 
 pre-downloaded packages: 
 13 minutes percentiles: 95th
 
 75th 50th 25th 5th percentiles: 5th 25th 50th 75th 95th
  • 57. 101 102 103 104 10−2 10−1 100 101 Sanitization time [s] Numberoffilesinsidepackage Exceeds EPC No Yes 0.1 1 10 100 uncompressed package size [MB] In practice, only a subset of packages needs to be sanitized between new update releases percentiles: 95th
 
 75th 50th 25th 5th percentiles: 5th 25th 50th 75th 95th
  • 58. what is the overhead of tolerating compromised mirrors?
  • 59. what is the overhead of tolerating compromised mirrors?
  • 60. what is the overhead of tolerating compromised mirrors?
  • 61. Latency of downloading the repository index from TSR. TSR instance is deployed in Europe. lower is better
  • 62. Latency of downloading the repository index from TSR. TSR instance is deployed in Europe. lower is better
  • 63. Latency of downloading the repository index from TSR. TSR instance is deployed in Europe. lower is better
  • 64. Trusted software repository: • enables software updates for integrity-enforced OS • introduces the sanitization process that allows supporting 99.76% of packages available in the Alpine Linux repository • tolerates a minority of software repository mirrors exhibiting Byzantine behavior Summary
  • 65. Summary Thank you wojciech.ozga@tu-dresden.de Trusted software repository: • enables software updates for integrity-enforced OS • introduces the sanitization process that allows supporting 99.76% of packages available in the Alpine Linux repository • tolerates a minority of software repository mirrors exhibiting Byzantine behavior