WO2011031387A1 - Hardware trust anchor - Google Patents

Hardware trust anchor Download PDF

Info

Publication number
WO2011031387A1
WO2011031387A1 PCT/US2010/043550 US2010043550W WO2011031387A1 WO 2011031387 A1 WO2011031387 A1 WO 2011031387A1 US 2010043550 W US2010043550 W US 2010043550W WO 2011031387 A1 WO2011031387 A1 WO 2011031387A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
security
computing environment
trust anchor
hardware
Prior art date
Application number
PCT/US2010/043550
Other languages
French (fr)
Inventor
Zhexuan Song
Jesus Molina
Joseph Gordon
Original Assignee
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Limited filed Critical Fujitsu Limited
Priority to CN2010800377652A priority Critical patent/CN102687118A/en
Priority to EP10815793A priority patent/EP2476057A1/en
Priority to JP2012528796A priority patent/JP5510550B2/en
Publication of WO2011031387A1 publication Critical patent/WO2011031387A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Definitions

  • Antivirus and anti-maiware tools work by executing a program in the target machine (computing device/computer), which collects data and attempts to detect malicious software. After this, the results are displayed using the target machine peripherals/resources (monitor, etc).
  • the anti-virus software itself is likely to be the target and/or victim of virus and/or malware, thus unable to fulfill its duty.
  • An aspect of an embodiment provides diagnosis of a trust state of a target computer system using a hardware (computing hardware) out-of-band (OOB) trust diagnoser as a hardware trust anchor, for example, an external hardware out-of-band trust diagnostic device, and/or a hardware isolated (in-band) trust diagnoser as the hardware trust anchor without another data communication connection in relation to the data communication connection with the target computer system, for example, an external hardware in-band trust diagnostic device.
  • the hardware out-of-band and/or in-band trust anchor is both trusted and verifies trust state of a target computer system.
  • the hardware trust anchor including an OOB and/or in-band trust anchor is external in relation to the target computer system as an external hardware trust anchor communicably connectable with the target computer system and/or integrated as an independent computing circuitry (a trust anchor chip) in the target computer system and/or as incorporated/implemented as part of Trusted Platform Module (TPM) of the target computer system, or any combinations thereof.
  • a trust anchor chip communicably connectable with the target computer system and/or integrated as an independent computing circuitry in the target computer system and/or as incorporated/implemented as part of Trusted Platform Module (TPM) of the target computer system, or any combinations thereof.
  • TPM Trusted Platform Module
  • the 'trust state' includes verifying trust state of the target computing system including a target virtual machine on the target computer system according to a security audit of the target computer system.
  • FIG. 1 is a diagram of functional and physical components of an embodiment of the present invention.
  • FIG. 2 is a flowchart of reporting trust state of a target machine, according to an embodiment of the present invention.
  • FIG. 3A is a diagram of a computer system according to an embodiment of the present invention.
  • FIGS. 3B-3C are state diagrams of the computer system in FIG. 3A, according to an embodiment of the present invention.
  • FIGS. 4-6 are flow charts of diagnosing a target computer with an external hardware trust anchor device, according to an embodiment of the present invention.
  • FIG. 7 of diagnosing a target computer with an external out-of-band hardware trust anchor device according to an embodiment according to an embodiment of the invention.
  • FIG. 8 is a functional b!ock diagram of a computer for the embodiments of the invention.
  • An aspect of an embodiment provides diagnosis of a trust state of a target computer system using a hardware (computing hardware) out-of-band (OOB) trust diagnoser as a hardware trust anchor, for example, an external hardware out-of-band trust diagnostic device, and/or a hardware isolated (in-band) trust diagnoser as the hardware trust anchor without another data communication connection in relation to the data communication connection with the target computer system, for example, an external hardware in-band trust diagnostic device.
  • the hardware out-of-band and/or in-band trust anchor is both trusted and verifies trust state of a target computer system.
  • the hardware trust anchor including an OOB and/or in-band trust anchor is external in relation to the target computer system as an external hardware trust anchor communicably connectable with the target computer system and/or integrated as an independent computing circuitry (a trust anchor chip) in the target computer system and/or as incorporated/implemented as part of Trusted Platform Module (TPM) of the target computer system, or any combinations thereof.
  • TPM Trusted Platform Module
  • the 'trust state' includes verifying trust state of the target computing system including a target virtual machine on the target computer system according to a security audit of the target computer system.
  • a hardware trust anchor which can be external and/or integrated with the target computer system.
  • This hardware trust anchor as with nautical anchors, protects the virtual environment from common threats by firmly grounding the virtual machine to a hardware device.
  • the embodiments use a hardware trust anchor with virtualized systems.
  • the trust anchor protects a virtual machine and provides a mechanism for asserting the fidelity of the underlying platform where the virtual machine will be deployed.
  • the hardware trust anchor informs the user of the current "trust state" of the target system thereby improving security awareness and reinforcing best practices.
  • An example candidate hardware trust anchor device is described to provide optimal security without sacrificing the flexibility of portable virtual environments.
  • the user transparently works on the same computer with two separate environments, one environment bound to the trust anchor that enforces strict security policies, for example, specifically launched to perform a target secured operation or target secured application (e.g., banking) alone or with another computing device, and the other totally unmanaged and modifiable by the user.
  • a target secured operation or target secured application e.g., banking
  • Mobile computing herein refers to virtualization of a computing environment for transporting/transferring among computer systems, for example, by network transmission, by computer readable recording media, etc.
  • VMs virtual machines
  • OS operating environment
  • applications virtual machines
  • the very nature of this new technology requires a paradigm shift in how virtual platform are secured. See Tal Garfinkel and Mendel Rosenblum, When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments, in 10th Workshop on Hot Topics in Operating Systems, 2005; and Steven J.
  • Trusted computing can fulfill this need and shows great promise for providing reliable measurements for (remote) attestation - see Trusted Computing Group, [Online] ⁇ URL: https://www.trustedcomputinggroup.org>.
  • Trusted Computing utilizes chained measurements stored in a cryptographic repository that can be provided on demand to third parties for attestation purposes.
  • trusted computing is not without its own problems - see Shane Balfe, Eimear Gallery, Chris J. Mitchell, and Kenneth G. Paterson.
  • the embodiments provide a hardware trust anchor. As with the nautical anchor of a vessel, the goal of a hardware trust anchor is to keep the target computing environment "immobile" by preventing modifications, thus providing a point of support for the architecture.
  • a hardware trust anchor provides one or more of 1 ) obtaining and/or verifying measurements of a target computing system as a 'trust state' of the target computing system, 2) in case of a VM, the data necessary to personalize the VM (or even the image of the whole VM), 3) be able to deploy the VM environment securely into the target platform; or 3) report faithfully the 'trust state' of both the VM and the trusted computing base (TCB) (target computing system) where the VM is deployed, or any
  • Security audit refers to one or more of confirmation, performing and/or monitoring of a measurement of a target machine and/or a VM, trust state of the target machine and/or the virtual machine on the target machine, grounding (or binding) of a virtual machine to the hardware trust anchor (i.e., binding refers to communicably connecting, enforcement, monitoring, and/or reporting (feedback) by the hardware trust anchor of security policies via and in relation to a real and/or a VM environment, which for example include strict limitations on modifications and/or executions in the real VM environment), safe storage of keys/certificates, enforcement of assignment of the hardware trust anchor to a specific real VM environment for communication, authenticity of update, authentication of user and/or administrator, verification and/or installation of a trusted computing base (TCB) on the target machine, security
  • TDB trusted computing base
  • Trusted computing base refers to required security control of or providing hardware and/or software elements for maintaining a trusted state in the target computer system (e.g., such elements to be security audited to be/maintain trusted can include (without limitation) TPM, video cards, interfaces, peripherals, memory, BIOS, storage devices, virtualization, etc.)
  • a measurement refers to a fixed-length digital representation of an input data sequence of any length.
  • a measurement can be, for example, a digital representation of whole and/or portion(s) of an operating environment (e.g., OS, data in computer readable media (memory, hard disk, etc.), data about configured peripherals/devices) and/or of files (e.g., files of software applications, data files) of a target machine, or in case of a VM an input virtual machine (VM) image including any VM hard disk and/or memory image, and/or files (e.g., files of software appiication, data files) of any VM on the target computing device, and used for verifying the target machine or target VM of the target machine as a 'trust state' of the target machine and/or target VM, for example, by comparison against another measurement(s) to detect any changes in the target machine and/or in the target VM in the target machine.
  • an operating environment e.g., OS, data in computer readable media (
  • TCG Trusted Computing Group
  • TPM Trusted Platform Module
  • TPM Trusted Platform module
  • PCRs extensible Platform Configuration Registers
  • PCRs are used to store measurements on the current status of the platform. PCRs are reset when the system powers up and can only be reset or extended, but never directly modified.
  • the extension of PCR can be performed using a cryptographic equation (1 ):
  • the II sign stands for concatenating the two arrays, while "Hash” refers to applying cryptographic hash function, in particular SHA1.
  • the first measuring entity of the target platform is trusted by default, as it is not previously measured by any other entities. This early measuring entity is called the Core Root of Trust (CRT) for measurement.
  • CRT Core Root of Trust
  • the CRT may be stored inside the TPM chip itself.
  • All software entities launched are expected to continue the chain of trust by extending the PCRs before launching any other software.
  • Each measurement is recorded and could be cryptographically verified using the PCRs by a verification party.
  • the action of sending these measurements to a verification party for verification is called attestation. Attestation keys can be used to sign the measurements inside the TPM.
  • the TPM could be seen as a cryptographic repository for the measurements of the target machine.
  • Virtualization a technology which allows a user to deploy a full OS on top of another software, provides an improved user experience for mobile users.
  • the virtualization software partitions the resources on the hardware, and enable the execution of multiple environments.
  • This virtualization software is usually referred as the Virtual Machine Monitor (VMM) or hypervisor.
  • VMM Virtual Machine Monitor
  • hypervisor hypervisor
  • One of the most important factors for security in virtualization is to maintain the integrity of the target platform including real VM environment, which can be achieved by performing measurements of the target platform including measurement of any virtual environment.
  • data leakage is prevented when a mobile environment (i.e., a VM) is used in a known but possibly corrupted machine (target machined).
  • a mobile environment i.e., a VM
  • target machined a mobile environment
  • the simplest example is when an employee launches a work environment in a platform outside the company's perimeter, such as the employee home computer.
  • Another possible scenario is to create a "cheat proof gaming client for online games.
  • a benefit of the embodiments is to emphasize user experience, by improving the user's security awareness while maintaining the transparency of day-to-day tasks. The user does not need to modify the user's other
  • the threat mode! can include 1 ) An attacker modifying the target platform before the VM environment is launched; 2) An attacker misleading the user into selecting a similar-looking but incorrect or phony or trojan horse VM environment; 3) A user mistakingly agreeing to launch a VM environment in an unsafe target platform; and 4) The trust anchor being obtained and used by an unauthorized user.
  • FIG. 1 is a diagram of functional and physical components of an embodiment of the present invention.
  • the embodiments include four main components: the target platform 100, which is a target computer or computing machine including the software environment 102 as a component.
  • the software environment 102 can be real and/or virtualized as a virtual machine (VM).
  • Other two components are the user data 104, and the hardware trust anchor 200.
  • a SONY PLAYSTATION user can launch (largely) immutable environments (games) in (largely) immutable platforms (the game console) while still personalizing the system by storing game data into an external memory stick or internal memory.
  • game consoles the only necessary requirement is that the environment (games) should not be easily replicated.
  • present embodiments also need to ensure that the data is protected from leakage.
  • the target platform 100 is the computer where the software environment 102 is deployed (executable).
  • the target platform 100 includes the hardware and software necessary to launch a "trusted computing environment" 103 called the trusted computing base (TCB) (see James Hendricks and Leendert van Doom, Secure bootstrap is not enough: shoring up the trusted computing base, in Proceedings of the 11th workshop on ACM SIGOPS European workshop. ACM New York, NY, USA, 2004), and perhaps other environments and hardware peripherals (according to an aspect of an embodiment, for maximum security all hardware should be considered part of the TCB).
  • the TCB of the target platform 100 includes virtualization technology to launch the virtual machine, such as a virtual machine monitor (VMM). Additionally, the TCB should provide isolation between environments 102a-n, report integrity of the TCB faithfully to the hardware trust anchor 200, include safe storage for keys and enforce the assignment of the trust anchor to a specific environment for communication.
  • VMM virtual machine monitor
  • the environment 102 can be real and/or a virtual machine containing the software, operating system and non-transient data required for the user to perform activities.
  • the VM is only modifiable through an updating process involving the hardware trust anchor. Otherwise, the virtual machine is immutable.
  • the environment 102 contains mechanisms to communicate with the hardware trust anchor 200, for reporting its state and storing the user created data.
  • the user data 104 includes user related data, including any data, such as documents created and modified by the user. These documents abide by the policies set forth by the administrator, which will be enforced by the environment 102 and the hardware trust anchor 200.
  • the user data 104 could be stored and protected either within the hardware trust anchor, within the target platform 100 and/or reside remotely in other computers.
  • the hardware trust anchor 200 can be an external entity from the target platform 100 and/or an internal independent integrated entity of the target platform 100 used to verify the target platform 00, secure user data 104, authenticate the user and administrator, and convey trust state information of the target platform 100 and/or the environment 102 to the user.
  • the hardware trust anchor 200 requires a communication channel to collect security related audit data, such as measurements, from the target platform 100, and for delivering any user data 104 to the environment 102.
  • the hardware trust anchor 200 can independently audit the target system 100, independent security auditing referring to actively collecting audit related data with minimized or without target platform 100 interaction.
  • This independent security auditing is only possible by plugging the hardware trust anchor 200 into direct access buses, such as PCI, or FIREWIRE, where it is possible to access the target platform's 100 resources (memory, hardisk) via specialized transfers, like DMA. See, Jesus Molina and William A. Arbaugh, "Using independent auditors as intrusion detection systems," In Proc.
  • the hardware trust anchor will receive security audit data, such as measurements from the platform 100 through a trusted channel such as the USB.
  • the security audit data such as the measurements should provide authentication to prove the security audit data are genuine.
  • the hardware trust anchor can display to the user the trust state information or results of the security audit independently from the target platform 100, for example, by displaying in real-time (live) the trust state or security audit results on the trust anchor 200 and/or on the target platform 100 and/or in other out-of-band display. The clearer the information is presented, the more likely security problems will be prevented.
  • the embodiments are based on implementation flexibility, so the different components may be implemented using different technologies.
  • Two existing actors can be in the architecture of the embodiments: The user 106 and the administrator 108.
  • the user 106 has initial control over the target platform 100 and over user data 104, and will be utilizing the environment 102 to work with the user data 104.
  • the administrator 108 creates the environment 102, provides and sets up the hardware trust anchor 200 and makes sure the correct trusted computing base exists on the target platform 100 controlled by the user/owner 106.
  • the relationship between the different components can be seen in Figure 1 , where the components controlled by the user 106 are represented by solid lines and the components controlled by the administrator 108 are represented with dashed lines.
  • FIG. 2 is a flowchart of reporting trust state of a target machine, according to an embodiment of the present invention.
  • the administrator 108 In the initial phase 210 the administrator 108
  • the trust anchor 200 personalizes the trust anchor 200 to the user 106 and binds a computing environment, for example, the environment 102 to the hardware trust anchor 200.
  • the user 106 utilizes the hardware trust anchor 200 to verify and install (if necessary) the required TCB 103 to the target platform 100. This operation 220 can also be performed directly by the administrator.
  • the user 106 can utilize the target platform 100 with the environment 102.
  • the hardware trust anchor 200 first verifies the target platform 100 where the environment 102 is to be launched. As the TCB 103 is small, the target platform 100 should be in a limited set of states, which have been previously stored in the hardware trust anchor 200. In the second phase 220, the target platform 100 as a second operation may verify the integrity of the hardware trust anchor 200 to determine if it is a trusted peripheral or not. The second phase 220 verifications of the target platform 100 and the hardware trust anchor 200 may be performed in any order and in any combinations. If any of these two verifications of the target platform 100 and the hardware trust anchor 200 fail, the hardware trust anchor 200 will perform diverse actions depending on policy as discussed herein, . Regardless of the result, the actions performed by the hardware trust anchor should be displayed to the user 106.
  • the hardware trust anchor 200 executes a security audit of the target platform 100, for example, the hardware trust anchor 200 controls so the software environment 102 is measured by the target platform 100 to be checked by the hardware trust anchor 200.
  • the environment 102 will then become immutable by the trust anchor 200 continuously monitoring and reporting to the user the trust state of the target platform 100.
  • the hardware trust anchor 200 can ensure that only the previously measured environment 102 have access to the user data 104.
  • a measurement might be complex or time consuming, as the environment 102 can be a large VM. Measurements of large virtual machines are discussed herein and in the copending US Patent Application no. 12/246, 144, which is incorporated herein by reference.
  • the target platform 100 assigns the hardware trust anchor 200 only to the software environment 102, either real or virtual, launched at 210, hence forbidding other, for example, subsequently launched real and/or virtual software environments, in the target platform 100 from communicating with the hardware trust anchor 200.
  • the user data is unlocked, making documents available and personalizing the environment for the user 106.
  • the software environment 102 will communicate the security state to the hardware trust anchor 200 (e.g. programs launched, etc), so an attacker will not be able to fool the user 106 into utilizing a similar but malicious environment on the target platform.
  • any data created in the (safe or trusted) environment 102 will automatically be stored in the hardware trust anchor 200 to prevent misuse by other software environments and possible data leakage.
  • the hardware trust anchor 200 is not limited to this black and white approach.
  • the hardware trust anchor 200 could select a proper environment depending on the software audit results, for example, measurements received from the target platform 100, or selectively release user data depending on policy.
  • the hardware trust anchor is capable of implementing a richer security policy and add flexibility to the administrator,
  • the user 106 should remove the hardware trust anchor 200 from the target platform 200, which in turn should erase the memory traces left by the environment 102 (e.g. shut the environment 102 down, reboot the environment 102).
  • FIG. 3A is a diagram of a computer system according to an embodiment of the present invention.
  • the hardware trust anchor 200 includes a TPM 814a, a Trusted Computing Group (TCG) Software Stack (TSS) 302, key management software/hardware 304, secure storage 306 storing data, for example, user data 104, a user checker/authenticator 816
  • the hardware trust anchor 200 can be external or internal in relation to the target platform 100.
  • the target host 100 includes a virtualized environment 102.
  • the target host 00 executes a virtual machine monitor (VMM) and hypervisor 320 by XEN, which includes the first guest virtualized operating system "domain 0" or domain zero (Dom 0) 325 that is booted automatically when the hypervisor 320 boots.
  • Dom 0 is given special management privileges and direct access to the physical hardware.
  • VMs virtual machine(s)
  • the user VMs 330 can be any operating system, such as MICROSOFT WINDOWS, APPLE OS, LINUX, etc.
  • a launched security auditor 340 can security audit the target host 100, for example, by obtaining or executing the measurements on the target host 100.
  • the host security checker/control 310 and security auditor 340 can be any combination of one or more software executable by any combination of one or more computer processors of the trust anchor 200 and/or target host 100.
  • the embodiments focus on an enterprise environment 102, where a user wants to utilize a work environment on a laptop or on a personal desktop.
  • a goal is to secure the mobile virtual environment 102 by making policy decisions transparent but not hidden to the user, keeping the user informed completes the chain of trust and reinforces good security practices.
  • the user first attaches or switches on the hardware trust anchor (for example, the external K9 mobile server discussed herein) into a USB port of the selected target machine 100.
  • the target machine 100 contains the required keys and trusted computing base (TCB) (methods and/or controlled or provided hardware/software components) to perform the initial
  • the TCB includes the hypervisor 320, the DomO 325 and BIOS of the target platform 100.
  • FIGS. 3B-3C are state diagrams of the computer system in FIG. 3A, according to an embodiment of the present invention.
  • the work environment denoted as Trusted Virtual Machine in this section (TVM) 330a_T coexists with the user environment, referred as the User Virtual Machine (UVM) 330a.
  • the TVM 330a_T Before connecting the hardware trust anchor 200 to the platform 00, the TVM 330a_T remains transparent to the user, as so is the entire TCB.
  • the virtual machine technology remains transparent to the user 106, giving the user the feeling the user is working in a machine with a single OS executing directly on the physical hardware. This feeling is reinforced by near-native speeds of the UVM 330a.
  • the DomO detects the hardware trust anchor 200 and at 245a, in cooperation with the initialization routine 247 of the hardware trust anchor 200, DomO launches 245b a virtual machine 330a.
  • the TCB in cooperation with the security auditor 340 and/or with host security checker/control 310 measures and/or sends the measurements of the target platform 100 to the hardware trust anchor 200. If the hardware trust anchor 200 correctly verifies the measurements, the virtual machine 330a can be deemed or is changed to a trusted state as a TVM 330a_T, and a message is displayed to the user 106 both in the hardware trust anchor 200 and by the TVM 330a_T.
  • the TCB can allocate TVM 330a_T shortcuts on the UVM 330a desktop.
  • the hardware trust anchor 200 requests biometric authentication from the user, for example, by user checker 816.
  • the user data 306 is unlocked, and shortcuts to TVM programs and user data appear on the desktop,
  • the time between user authentication and shortcuts from the TVM 330a_T appearing in the UVM 330a is around 5-10 seconds. This includes all verifications by the hardware trust anchor 200.
  • the user clicks on one of the new shortcuts a program is launched in the TVM 330a_T, and the user can interact with it in the UVM 330a.
  • the hardware trust anchor 200 displays the same icon, assuring the user is working in a trusted space. While the two VMs 330a and 330a_T are visually merged on the same desktop, the isolation enforced by the TCB still exists between environments. For example, a keylogger as a malicious software installed on the UVM 330a will not be able to intercept information typed inside programs launched by the TVM 330a_T. Also, a cross site scripting attack in a UVM 330a based browser will not affect the TVM 330a_T based browser, even if both are open at the same time. If a program is closed in the TVM 330a_T the related icon on the hardware trust anchor 200 disappears, informing the user this application is no longer running in the TVM 330a_T.
  • the hardware trust anchor 200 acts [ike a "compass," letting the user 106 know which programs are bound to the hardware trust anchor 200.
  • only programs running in the TVM 330a_T have access to user data 306 stored in the hardware trust anchor 200, so work documents stored in the hardware trust anchor 200 will be only available through the TVM 330aango T.
  • the hardware trust anchor 200 If, at 230, the hardware trust anchor 200 does not receive measurements , for example, after 5 seconds, the hardware trust anchor 200 will notify the user and perform remediation procedures, such as start acting as a USB thumbdrive, allowing the user to launch the Xclient/Xserver mode of operation for regular work. If, at 230, the measurements are incorrect, the hardware trust anchor 200 wi!l also start a remediation process, for example, in case of an out-of-band hardware trust anchor utilizing the OOB connection or in case of an in- band hardware trust anchor utilizing the target platform machine 100 as an "untrusted" hop, to access an administrator site server (heath check server) to discover if the unknown
  • the administrator site can sign this measurement with a private key, and the hardware trust anchor 200 can verify the results by utilizing an embedded public key from the administrator. The technical details of an implementation are discussed next.
  • FIGS. 4-6 are flow charts of diagnosing a target platform 100 with an external hardware trust anchor device, according to an embodiment of the present invention, in the example flow charts, a target virtualized software environment 102 of the target platform 100 and only the collection of a measurement of the target platform 100 is described as a security audit of the target platform 100, however, the embodiments are not limited to virtualized software environments 102 and collection of measurements of the target platform 100 as a security audit, but as discussed herein the hardware trust anchor device 200 can verify the health or trust state of a target real software environment 02 and can execute other security audit operations in relation to the target platform 00 including the target software environment 102. In other words, the embodiments are not limited to measurement collection for security diagnosis, and any diagnostic information that includes security diagnostic information can be collected.
  • a hardware trust anchor (HTA) 200 is activated for the target computing environment 100, for example, plugged into the target computing environment or target PC 100.
  • HTA hardware trust anchor
  • the security audit continues continue at 500 to verify the measurement in FIG. 5. If at 500, the measurement verification is successful, at 418, the success is displayed to the user. If, at 500, the measurement verification fails, at 432 failed measurement verification result is displayed to the user.
  • the HTA determines whether the measurement can or should be verified internally. If, for example, the HTA 700 has an OOB connection 714 to a server 710, the security audit continues in FIG. 6 at 600. If the HTA 200 internally verifies the measurements, at 502, the HTA 200 verifies received measurement internally . For example, at 502, if the measurement indicates changes to a particular file or area of memory/storage device, then such indication is used for troubleshooting and/or remediation. At 506, it is determined whether the target platform 100 requires any remediation.
  • remediation is required, at 508, it is determined whether there is any patch/cleaner software/data as remediation, and if so, at 510 it is determined whether the patch/cleaner can be pushed to the target platform 100. At 512, the patch/cleaner is pushed to the target platform 100 and executed. At 504, results of patch/cleaner availability and/or whether remediation is possible by pushing the patch/cleaner to the target platform 100, is displayed for the user on a display 802 of the HTA 200.
  • the server 710 verifies the measurements and/or the signature verification result of the measurement (as the case may be) sent to the remote server 710.
  • the server 710 verifies the measurements (e.g., by using a signature when available from the TPM 814b, etc.) and at 602, sends the results and/or remediation and/or patches to HTA 200.
  • the OOB HTA 700 processes measurement verification results and/or remediation received from the server 710.
  • the HTA 700 determines whether there are any available remediation, such as patches and/or cleaner software, etc., and if so, at 612, a signature of such a patch/cleaner is verified.
  • a result of verification at 612 and/or whether at 606 there are any patch/cleaner is displayed for the user on display 802 of the HTA 700.
  • it can also be determined whether a patch/cleaner can be pushed onto the target platform 100, and if so, at 614 the patch/cleaner is pushed to the target platform 100 and executed. If the patch/cleaner cannot be pushed to the target platform 100, at 610, such a result is displayed for the user on display 802 of the HTA 700.
  • FIG. 7 is a diagram of a computer system according to an embodiment of the invention.
  • an external out-of-band (OOB) hardware trust anchor 700 verifies and maintains security health of a target computing environment 100.
  • the OOB device 700 is inserted into and/or communicably connected to the target computer 100, and the target computer 100 launches a security auditor 340, for example, an internal measurement collection program for collecting the state of the target platform 100.
  • a security auditor 340 for example, an internal measurement collection program for collecting the state of the target platform 100.
  • One alternative method is for the target system 100 to launch a security auditor 340 that is hosted in the OOB hardware trust anchor device 700, for example, by masking the device 700 as a storage device (e.g., a CD- ROM, USB device, etc.) and execute the security auditor 340.
  • a storage device e.g., a CD- ROM, USB device, etc.
  • the OOB hardware trust anchor 700 itself starts a security auditor 310 that can directly collect the state of the target system 100. This is possible with connectors such as F!REWIRE that have demonstrated capabilities for direct access to target system 100 memory and resources.
  • the target system 100 under verification sends the collected data to the portable device 700 or the data is collected by the portable device 700 (as the case may be).
  • the portable device 700 will verify the results, by a host security diagnostic software 310 and/or in cooperation with health check server 710, and suggest remediation to the user using its own display mechanism. For example, the display 802 in the portable device 700 can show "You have two viruses.” The notification should be clear so even novice users could clearly understand the state of the target system 100 under verification and the necessary steps to remediate the reported problems.
  • the OOB hardware trust anchor 700 is in wire or wireless network 712 communication with the target computing environment (e.g., a PC) 100 and controls security diagnosis of the target computing environment 100.
  • Out-of-band (OOB) refers to a computing environment independent or exclusive of a target computing environment 100.
  • OOB includes an OOB network connection, which is another network connection to connect to a remote device 710 and independent or exclusive of a network connection used by the target computing environment 100.
  • security diagnosis refers to any diagnosis related to operation of a computing environment, including (without limitation) malicious software detection/anti malicious software procedures, computing environment configuration/setting/properties management (retrieval, setting, analysis), measurement of computing environment, etc.
  • the OOB hardware trust anchor 700 is an out-of-band security health check verifier or security diagnoser, which can be an external security diagnostic computing device, for example, a handheld computing device security health check verifier 700, which is configured to output information, for example, via a display 802, and configured to wire or wireless network 714 communicate out-of-band (OOB) in relation to the target machine 100, with a another computing apparatus/device 710.
  • OOB out-of-band
  • this will be an offload for the health check verifier 700, to prevent tampering and trickery from malicious software, for example, a virus.
  • the external OOB connection 714 is not related to or is exclusive of the target machine's network connection 712.
  • the out-of-band diagnoser 700 for example, external diagnostic device (e.g., handheld diagnostic device) 700 can be affected by the state of the target machine 100.
  • the out-of-band diagnoser 700 is trusted.
  • a portable OOB security verifier or security diagnostic device 700 with user interaction capabilities is connected to a target platform 100 using an exiting connector 712, such as USB or FIREWIRE.
  • Typical OOB security verifier devices 700 are the ones that the user is more likely to trust, such as an IPOD or cell phones, and/or have been verified to be trusted.
  • IPOD or a mobile phone might be deemed a trusted device, for example, by a user 106, by having a higher network isolation characteristic in relation to the target machine 100, for example, a desktop computer 100.
  • the OOB security verifier device 700 may include the required diagnosis software, namely anti-malicious software, measurement collector, etc., already stored in a repository (computer readable recording media) 716 of the OOB security verifier device 700, or the OOB security verifier device 700 can first download some stored security health check software 310 via the OOB connection 714 from the security health check server 710 that provides the security health check capabilities.
  • an anti-virus vendor might sell the anti-virus software for the OOB security verifier device 102 as part of the anti-virus software.
  • a single-purposed external and/or internal hardware 200, 700 can be designed and used for verifying or diagnosing the security health of the target system 100 where it is plugged or in which it is activated. This will work like a "digital thermometer" of the target system 100, much in the same fashion that fever is measured to look for diseases in humans.
  • the collected data can come either from trusted sources, such as an embedded black box (e.g. TPM 814) or from untrusted sources, such as software 310, 340 running in the system whose result might be tampered by malicious software (e.g., malware, virus).
  • the portable device 200, 700 can provide the user with estimation on confidence of these security diagnostics depending on the mechanism it uses to collect the information. For example, if the results are backed by a trusted hardware such a TPM 814, it can show "very high confidence" along the results. If the results come from a virtual machine monitor/manager 330, it can display "high confidence". If the results are provided by the host security checker 310 and/or security auditor 340 in cooperation with off the shelf antivirus software, it can show "low confidence", and so on.
  • trusted sources such as an embedded black box (e.g. TPM 814)
  • untrusted sources such as software 310, 340 running in the system whose result might be tampered by malicious software (e.g., malware, virus).
  • Embedded devices such as a TPM 814
  • TPM 814 can sign the report using certified private keys. This will demonstrate the integrity of the report itself to the security verifier device 200, 700.
  • both programs can authenticate each other by means of keyed hashes, such as HMAC.
  • the host security checker software 310 in charge of controlling collection and/or collecting security data from the target host 100 will create a keyed hash of the report using a pre-shared key between the software running 340 in the host 100 and the software 310 running in the security verifier device 200, 700.
  • the software 310 in the security verifier device 200, 700 could verify the validity of the report by recreating the keyed hash.
  • any cryptographic verification technique HMAC, signing keys
  • HMAC cryptographic verification technique
  • the portable security verifier device is a portable OOB security verifier device 700 that has external connection capabilities (such as WIFI, or cellular network)
  • the final verification can be done in a remote server 710 too, and remediation tools, such as malware cleaners, can be downloaded in the verifier device 700 and later pushed into the target system 100 under verification. This works much in the same fashion as a doctor providing pil!s to a patient once a diagnostics is provided.
  • the hardware trust anchor or security diagnoser device 200, 700 performs combinations of diagnosis depending upon accessibility determination to the target computing environment and guides the user actions.
  • the hardware trust anchor operations include one or more diagnostic actions of (1 ) upon being recognized by diagnostic information collector 340 in the target environment 100, the hardware trust anchor 700 receives diagnostic information (e.g., collect information on memory, operating system, initialization/registry files, storage device, measurements of files for detecting changes in the files, etc.) for analysis (detection of changes in files, malicious software detection,
  • VMM virtual machine monitor/manager
  • the hardware trust anchor interactively guides the user through the diagnostic actions, according to diagnostic information of the target computing environment 100 and/or remediation information received from the OOB connection 714 (as the case may be).
  • the hardware trust anchor is exclusive or
  • the hardware trust anchor is read-only.
  • the hardware trust anchor is a read-only virtual machine.
  • VMMs support this read-only function by restoring the VM images back to initial state after turning off the VMM, and/or controlled via the file system by, for example, before launching the VM image, creating a snapshot of the VM image, and after turning off the VMM, restore to the snapshot.
  • the hardware trust anchor is an external computing device, set the device as read-only or non-writable.
  • the external hardware in-band trust anchor is a handheld device health check ('trust state') verifier configured to output information, for example, via a display, and configured to in-band security audit the target computing system without another communication connection in relation to previously or existing established communication with the target machine. In most cases, this will be an offload for the health check verifier, to prevent tampering and trickery from virus.
  • the embodiments substantially ensure that the external hardware in-band trust anchor (e.g., handheld OOB diagnostic device) cannot be affected by the state of the target machine.
  • the external hardware OOB trust anchor is a handheld device health check ('trust state') verifier configured to output information, for example, via a display, and configured to wire or wirelessly communicate out-of-band (OOB connection), which is an independent communication in relation to or exclusive of a previously or existing established communication with the target machine, with another computing apparatus/device and OOB security audit the target computer machine. In most cases, this will be an offload for the health check verifier, to prevent tampering and trickery from virus.
  • the OOB connection is not related to or is independent of and/or exclusive of the target machine's connection with a network.
  • the embodiments substantially ensure that the external hardware OOB trust anchor (e.g., handheld in-band diagnostic device) cannot be affected by the state of the target machine.
  • a benefit is use of a familiar device, such as an IPOD, as an external hardware OOB diagnostic device to verify and display the results of any diagnosis of a target computing environment, for example, antivirus collection, providing information related to a 'trust state' of the target computing environment, and suggest or implement remediation techniques.
  • a benefit of the embodiments is OOB diagnosis of the target computing environment when the network connection of the target computing
  • the external hardware OOB diagnostic device performs combinations of diagnosis depending upon accessibility determination to the target computing environment.
  • FIG. 1 a general architecture for securing virtual machines based on a hardware trust anchor.
  • the security problems of mobile virtual machines are addressed while remaining flexible in possible implementations, since the hardware trust anchor can be embodied in different candidate mobile devices, such as a mobile/portable computer, a USB drive with a CPU, a mobile phone, or a specifically designed device. 3.
  • a practical user experience is provided, stressing the practicality of the embodiments, by providing an embodiment based upon a hardware trust anchor in a specialized single purpose embedded device, created drivers and software for communication between the target virtual machine and the hardware trust anchor, and modifications to a virtual machine monitor, for example, the XEN virtual machine monitor to improve both its security and usability.
  • FIG. 8 is a functional block diagram of a computer for the embodiments of the invention, namely the computer is an example of an external hardware trust anchor device 200 as the health check verifier. Further, the computer can be an example of a target machine or target computing environment 100. In FIG. 8, the computer can be any computing device. Typically, the computer includes a display or output unit 802 to display a user interface or output information or indications, such as a diode, A computer controller 804 (e.g., a hardware central processing unit) executes instructions (e.g., a computer program or software) that control the apparatus to perform operations. Typically, a memory 806 stores the instructions for execution by the controller 804. A Trusted Platform Module (TPM) 814 can be provided.
  • TPM Trusted Platform Module
  • the apparatus reads/writes/processes data of any computer readable recording media 810 and/or communication transmission media interface 812.
  • the user authenticator 816 can be finger print/palm sensor, or other software/computing hardware for authenticating a user.
  • the display 802, the CPU 804 e.g., hardware logic circuitry based computer processor that processes instructions, namely software
  • the memory 806, the computer readable media 810, the communication transmission media interface 812, TPM 814 and user authenticator 816 are in communication by the data bus 808. Any results produced can be displayed on a display of the computing hardware.
  • any combinations of one or more of the described features, functions, operations, and/or benefits can be provided.
  • a combination may include only one or may include two or more.
  • the embodiments can be implemented as an apparatus (a machine) that includes computing hardware (i.e., computing apparatus), such as (in a non-limiting example) any computer that can store, retrieve, process and/or output data and/or communicate (network) with other computers.
  • an apparatus can include one or more apparatuses in computer network
  • a computer processor can include one or more computer processors in one or more apparatuses or any combinations of one or more computer processors and/or apparatuses.
  • An aspect of an embodiment relates to causing one or more apparatuses and/or computer processors to execute the described operations. The results produced can be displayed on the display.
  • a program/software implementing the embodiments may be recorded on computer- readable recording media.
  • the computer-readable recording media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or volatile and/or non-volatile semiconductor memory (for example, RAM, ROM, etc.).
  • the magnetic recording apparatus include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT).
  • the optical disk include a DVD (Digital Versatile Disc), DVD-ROM, DVD- RAM (DVD-Random Access Memory), BD (Blue-ray Disk), a CD-ROM (Compact Disc - Read Only Memory), and a CD-R (RecordableVRW.
  • a data signal moves on transmission communication media, such as wired network or wireless network, for example, by being incorporated in a carrier wave.
  • the data signal may also be transferred by a so-called baseband signal.
  • a carrier wave can be transmitted in an electrical, magnetic or electromagnetic form, or an optical, acoustic or any other form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

A target computing environment is secured by a hardware trust anchor that provides a trust state of the target computing environment based upon a security audit of the target computing environment. And diagnosing the target computing environment can be diagnosed by the hardware trust anchor according to the security diagnostic information.

Description

TITLE
HARDWARE TRUST ANCHOR
[0001] This application is related to and claims priority to U.S. Application No. entitled HARDWARE TRUST ANCHOR having a serial number 12/556, 148 filed on September 9, 2009, the disclosures of which are incorporated herein by reference.
FIELD
[0002] The embodiments discussed herein relate to security of a computer.
BACKGROUND
[0003] Antivirus and anti-maiware tools work by executing a program in the target machine (computing device/computer), which collects data and attempts to detect malicious software. After this, the results are displayed using the target machine peripherals/resources (monitor, etc). However, there are problems with this approach. Firstly, the anti-virus software itself is likely to be the target and/or victim of virus and/or malware, thus unable to fulfill its duty.
Secondly, the whole purpose of certain malware is to "sell" anti-malware by displaying messages like "Your computer is infected." Third, in case of a virtual machine on a machine, a user may have problems distinguishing between the different environments (V s) residing in a single machine, and could easily be tricked into using a potentially corrupted environment instead of the correct one.
[0004] Users can become unlikely to believe the results of malicious software detection that is displayed on the screen, even if such results come from a genuine antivirus tool. One solution for this is to boot the infected machine from a different storage device of the infected machine, such as a CD, or a USB thumb drive, in relation to the hard disk drive (HDD), into a clean state. After that, the user starts scanning the HDD for the malicious software. However, this solution requires certain proficiency with computers, namely rebooting, and further the CD and the USB thumb drive only serve as a reboot function for rebooting the infected machine.
SUMMARY
[0005] It is an aspect of the embodiments discussed herein to provide a method, a machine (computing apparatus/device) and computer-readable medium thereof, verifying health or 'trust state' of a target computer system (target machine) according to a security audit of the target computer system. An aspect of an embodiment provides diagnosis of a trust state of a target computer system using a hardware (computing hardware) out-of-band (OOB) trust diagnoser as a hardware trust anchor, for example, an external hardware out-of-band trust diagnostic device, and/or a hardware isolated (in-band) trust diagnoser as the hardware trust anchor without another data communication connection in relation to the data communication connection with the target computer system, for example, an external hardware in-band trust diagnostic device. According to an aspect of an embodiment, the hardware out-of-band and/or in-band trust anchor is both trusted and verifies trust state of a target computer system.
According to an aspect of an embodiment, the hardware trust anchor including an OOB and/or in-band trust anchor is external in relation to the target computer system as an external hardware trust anchor communicably connectable with the target computer system and/or integrated as an independent computing circuitry (a trust anchor chip) in the target computer system and/or as incorporated/implemented as part of Trusted Platform Module (TPM) of the target computer system, or any combinations thereof.
[0006] According to an aspect of an embodiment, the 'trust state' includes verifying trust state of the target computing system including a target virtual machine on the target computer system according to a security audit of the target computer system.
[0007] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF DRAWINGS
[0008] FIG. 1 is a diagram of functional and physical components of an embodiment of the present invention.
[0009] FIG. 2 is a flowchart of reporting trust state of a target machine, according to an embodiment of the present invention.
[0010] FIG. 3A is a diagram of a computer system according to an embodiment of the present invention.
[0011] FIGS. 3B-3C are state diagrams of the computer system in FIG. 3A, according to an embodiment of the present invention.
[0012] FIGS. 4-6 are flow charts of diagnosing a target computer with an external hardware trust anchor device, according to an embodiment of the present invention.
[0013] FIG. 7 of diagnosing a target computer with an external out-of-band hardware trust anchor device, according to an embodiment according to an embodiment of the invention. [0014] FIG. 8 is a functional b!ock diagram of a computer for the embodiments of the invention.
DETAILED DESCRIPTION OF E BODIMENT(S)
[0015] It is an aspect of the embodiments discussed herein to provide a method, a machine (computing apparatus/device) and computer-readable medium thereof, verifying health or 'trust state' of a target computer system (target machine) according to a security audit of the target computer system. An aspect of an embodiment provides diagnosis of a trust state of a target computer system using a hardware (computing hardware) out-of-band (OOB) trust diagnoser as a hardware trust anchor, for example, an external hardware out-of-band trust diagnostic device, and/or a hardware isolated (in-band) trust diagnoser as the hardware trust anchor without another data communication connection in relation to the data communication connection with the target computer system, for example, an external hardware in-band trust diagnostic device. According to an aspect of an embodiment, the hardware out-of-band and/or in-band trust anchor is both trusted and verifies trust state of a target computer system.
According to an aspect of an embodiment, the hardware trust anchor including an OOB and/or in-band trust anchor is external in relation to the target computer system as an external hardware trust anchor communicably connectable with the target computer system and/or integrated as an independent computing circuitry (a trust anchor chip) in the target computer system and/or as incorporated/implemented as part of Trusted Platform Module (TPM) of the target computer system, or any combinations thereof. According to an aspect of an
embodiment, the 'trust state' includes verifying trust state of the target computing system including a target virtual machine on the target computer system according to a security audit of the target computer system.
[0016] In case of virtual environments, when current security techniques are applied to portable virtual environments, most techniques prove to be ineffective. While traditional security tools could be adapted, the modifications may come at a prohibitive cost, and at the expense of usability and reduced protection. The embodiments provide an alternative solution: a hardware trust anchor, which can be external and/or integrated with the target computer system. This hardware trust anchor, as with nautical anchors, protects the virtual environment from common threats by firmly grounding the virtual machine to a hardware device. The embodiments use a hardware trust anchor with virtualized systems. The trust anchor protects a virtual machine and provides a mechanism for asserting the fidelity of the underlying platform where the virtual machine will be deployed. Perhaps more importantly, the hardware trust anchor informs the user of the current "trust state" of the target system thereby improving security awareness and reinforcing best practices. An example candidate hardware trust anchor device is described to provide optimal security without sacrificing the flexibility of portable virtual environments.
According to an aspect of an embodiment, the user transparently works on the same computer with two separate environments, one environment bound to the trust anchor that enforces strict security policies, for example, specifically launched to perform a target secured operation or target secured application (e.g., banking) alone or with another computing device, and the other totally unmanaged and modifiable by the user.
[0017] Virtualization technology as mobile computing has become a mixed blessing for companies that require mobile computing. Mobile computing herein refers to virtualization of a computing environment for transporting/transferring among computer systems, for example, by network transmission, by computer readable recording media, etc. On one hand, virtual machines (VMs) provide increased flexibility for users allowing them not only to transport their whole working environment (OS, applications) as files, but also to share and modify the working environment with ease. On the other hand, the very nature of this new technology requires a paradigm shift in how virtual platform are secured. See Tal Garfinkel and Mendel Rosenblum, When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments, in 10th Workshop on Hot Topics in Operating Systems, 2005; and Steven J. Vaughan-Nichols, Virtualization Sparks Security Concerns, Computer, 41 (8): 13-15, 2008. The same flexibility that allows users to create and potentially share thousands of virtual machines, also creates new security threats and management nightmares. In addition, virtualization software in the target platform where the virtual machine is deployed may be corrupted, leaking private data to other virtual machines deployed on the same target platform. Unfortunately, current antivirus and other security related products meant to protect virtual machines are unab!e to identify root kits or malware that target the virtualization layer, as discussed in Samual T, King and Peter M. Chen, SubVirt: implementing malware with virtual machines, in Security and Privacy, 2006 IEEE Symposium on page 14, 2006. Furthermore, a user may have problems distinguishing between the different environments - real environment vs. authentic VM vs. fake/phony/malicious VM - residing in a single machine, and could easily be tricked into using a potentially corrupted environment instead of the correct one. Replicating a virtual machine can be very simple, and creating malicious environments that look identical to the user is hence feasible for even novice attackers. Aiding the user in distinguishing among different environments is one of the problems resolved by the embodiments.
[0018] Hence, it is reasonable to perform a thorough review of the current security design before adapting it to virtual machines. In particular, as the virtual machine cannot inspect the target platform directly, the target platform, where the virtual machine is to be deployed, needs to be reliably attested beforehand. Trusted computing can fulfill this need and shows great promise for providing reliable measurements for (remote) attestation - see Trusted Computing Group, [Online] <URL: https://www.trustedcomputinggroup.org>. Trusted Computing utilizes chained measurements stored in a cryptographic repository that can be provided on demand to third parties for attestation purposes. However, trusted computing is not without its own problems - see Shane Balfe, Eimear Gallery, Chris J. Mitchell, and Kenneth G. Paterson.
Challenges for trusted computing, IEEE Security and Privacy, 6(6):60-66, 2008. In most cases there is no easy mechanism to reliably transmit the measurements to end users, since if the target machine is not safe, one cannot assure the proper message will displayed. Additionally, the chain of trust must start from somewhere, and that requires some sort of infrastructure. Interestingly, both virtualization and trusted computing share a similar problem: the lack of an "anchor" that will collect and verify measurements, and provide reliable and understandable information to users. To solve these problems, the embodiments provide a hardware trust anchor. As with the nautical anchor of a vessel, the goal of a hardware trust anchor is to keep the target computing environment "immobile" by preventing modifications, thus providing a point of support for the architecture.
[0019] According to an aspect of an embodiment a hardware trust anchor provides one or more of 1 ) obtaining and/or verifying measurements of a target computing system as a 'trust state' of the target computing system, 2) in case of a VM, the data necessary to personalize the VM (or even the image of the whole VM), 3) be able to deploy the VM environment securely into the target platform; or 3) report faithfully the 'trust state' of both the VM and the trusted computing base (TCB) (target computing system) where the VM is deployed, or any
combinations thereof. While a range of technologies might be used to implement the
measurement mechanisms required by a hardware trust anchor, a combination of a hardware trust anchor and trusted computing technologies will provide good implementation results - see generally, Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, and Leendert van Doom, Turtles all the way down: Research challenges in user-based attestation, in Proceedings of the Workshop on Hot Topics in Security (HotSec), August 2007; and Bryan Parno, Bootstrapping trust in a "trusted" platform, in HOTSEC08: Proceedings of the 3rd conference on Hot topics in security, USENIX Association, pages 1-6, Berkeley, CA, USA, 2008.
[0020] Security audit refers to one or more of confirmation, performing and/or monitoring of a measurement of a target machine and/or a VM, trust state of the target machine and/or the virtual machine on the target machine, grounding (or binding) of a virtual machine to the hardware trust anchor (i.e., binding refers to communicably connecting, enforcement, monitoring, and/or reporting (feedback) by the hardware trust anchor of security policies via and in relation to a real and/or a VM environment, which for example include strict limitations on modifications and/or executions in the real VM environment), safe storage of keys/certificates, enforcement of assignment of the hardware trust anchor to a specific real VM environment for communication, authenticity of update, authentication of user and/or administrator, verification and/or installation of a trusted computing base (TCB) on the target machine, security
diagnosing, security remediation, or any combinations thereof. Trusted computing base (TCB) refers to required security control of or providing hardware and/or software elements for maintaining a trusted state in the target computer system (e.g., such elements to be security audited to be/maintain trusted can include (without limitation) TPM, video cards, interfaces, peripherals, memory, BIOS, storage devices, virtualization, etc.)
[0021] A measurement refers to a fixed-length digital representation of an input data sequence of any length. A measurement can be, for example, a digital representation of whole and/or portion(s) of an operating environment (e.g., OS, data in computer readable media (memory, hard disk, etc.), data about configured peripherals/devices) and/or of files (e.g., files of software applications, data files) of a target machine, or in case of a VM an input virtual machine (VM) image including any VM hard disk and/or memory image, and/or files (e.g., files of software appiication, data files) of any VM on the target computing device, and used for verifying the target machine or target VM of the target machine as a 'trust state' of the target machine and/or target VM, for example, by comparison against another measurement(s) to detect any changes in the target machine and/or in the target VM in the target machine.
[0022] Trusted Computing: The foundation of TCG (Trusted Computing Group) is the Trusted Platform Module (TPM) (Trusted Computing Group. Trusted platform module (TPM) specifications. [Online] <URL: https://www.trustedcomputinggroup.org/specs/TPM/>, a hardware root-of-trust. The most common implementation of a TPM is a chip physically attached to a computer. The TPM is accessed by software using a well defined command set. Through this command set, the TPM provides cryptographic functionality such as encrypting, signing, key generation and random number generation. TPM could also store a limited amount of information in nonvolatile memory. Additionally, the TPM contains a set of extensible Platform Configuration Registers (PCRs). As of the latest version, a total of 24 PCRs exist on the TPM. PCRs are used to store measurements on the current status of the platform. PCRs are reset when the system powers up and can only be reset or extended, but never directly modified. The extension of PCR can be performed using a cryptographic equation (1 ):
Extend(PCRN; value) = Hash(PCRN II value) (1 )
[0023] The II sign stands for concatenating the two arrays, while "Hash" refers to applying cryptographic hash function, in particular SHA1. The first measuring entity of the target platform is trusted by default, as it is not previously measured by any other entities. This early measuring entity is called the Core Root of Trust (CRT) for measurement. For enhanced security, the CRT may be stored inside the TPM chip itself. Thereafter, all software entities launched are expected to continue the chain of trust by extending the PCRs before launching any other software. Each measurement is recorded and could be cryptographically verified using the PCRs by a verification party. The action of sending these measurements to a verification party for verification is called attestation. Attestation keys can be used to sign the measurements inside the TPM. Hence, the TPM could be seen as a cryptographic repository for the measurements of the target machine.
[0024] Desktop Virtualization: Virtualization, a technology which allows a user to deploy a full OS on top of another software, provides an improved user experience for mobile users. The virtualization software partitions the resources on the hardware, and enable the execution of multiple environments. This virtualization software is usually referred as the Virtual Machine Monitor (VMM) or hypervisor. The implication for this technology to a server administrator is immediate, as the adminitrator could maximize hardware resources by co-locating several computing environment sites in a single hardware. For desktop computing, it allows the user to carry the full operating system between different platforms.
[0025] Initially some security benefits of virtualization on desktops, which are suggested in Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh, Terra: a virtual machine-based platform for trusted computing, in SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 193-206, New York, NY, USA, 2003, end up opening a set of new security concerns - see Tal Garfinkel and Mendel Rosenblum, When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments, in 10th Workshop on Hot Topics in Operating Systems, 2005; and Steven J. Vaughan-Nichols, Virtualization Sparks Security Concerns, Computer, 41 (8): 13-15, 2008, which in most cases cannot be handled under current security tools and technologies. One of the most important factors for security in virtualization is to maintain the integrity of the target platform including real VM environment, which can be achieved by performing measurements of the target platform including measurement of any virtual environment.
[0026] An embodiment of a hardware trust anchor, including the techniques developed to perform the distinct measurements and communications, is described next.
[0027] According to an aspect of an embodiment, data leakage is prevented when a mobile environment (i.e., a VM) is used in a known but possibly corrupted machine (target machined). The simplest example is when an employee launches a work environment in a platform outside the company's perimeter, such as the employee home computer. Another possible scenario is to create a "cheat proof gaming client for online games. A benefit of the embodiments is to emphasize user experience, by improving the user's security awareness while maintaining the transparency of day-to-day tasks. The user does not need to modify the user's other
environments, which may contain unsafe software, as long as the target platform provides complete isolation between environments. The embodiments also do not require complex architectures, such as PKI or privacy CAs - see TCG infrastructure Workgroup, Subject key attestation evidence extension, [Online] <URL:
https://www.trustedcomputinggroup.org/specs/lWG/IWG SKAE Extension 1 -00.pdf>, June 2005 - although PKI or privacy CAs may be used for certain purposes, such as scalability of the solution. The embodiments also do not require a constant Internet connection to utilize the environment in a positive case - see Samuel T. King and Peter M. Chen, SubVir implementing malware with virtual machines, in Security and Privacy, 2006 IEEE Symposium on, page 14, 2006 - although Internet access, for example, an OOB data communication connection, may be mandated by policy, either constantly or intermittently for updates.
[0028] The threat mode! can include 1 ) An attacker modifying the target platform before the VM environment is launched; 2) An attacker misleading the user into selecting a similar-looking but incorrect or phony or trojan horse VM environment; 3) A user mistakingly agreeing to launch a VM environment in an unsafe target platform; and 4) The trust anchor being obtained and used by an unauthorized user.
[0029] Components and actors in design of the embodiments:
[0030] FIG. 1 is a diagram of functional and physical components of an embodiment of the present invention. The embodiments include four main components: the target platform 100, which is a target computer or computing machine including the software environment 102 as a component. The software environment 102 can be real and/or virtualized as a virtual machine (VM). Other two components are the user data 104, and the hardware trust anchor 200.
Separating the environment 102 and the user data 104 is necessary to establish policies on user data 104 while maintaining a stable environment 102. The concept can be understood readily if compared with a game console system, such as a SONY PLAYSTATION. A SONY PLAYSTATION user can launch (largely) immutable environments (games) in (largely) immutable platforms (the game console) while still personalizing the system by storing game data into an external memory stick or internal memory. For gaming consoles the only necessary requirement is that the environment (games) should not be easily replicated. In addition, the present embodiments also need to ensure that the data is protected from leakage.
[0031] Next, the four main components of the architecture of the embodiments is described. The target platform 100 is the computer where the software environment 102 is deployed (executable). The target platform 100 includes the hardware and software necessary to launch a "trusted computing environment" 103 called the trusted computing base (TCB) (see James Hendricks and Leendert van Doom, Secure bootstrap is not enough: shoring up the trusted computing base, in Proceedings of the 11th workshop on ACM SIGOPS European workshop. ACM New York, NY, USA, 2004), and perhaps other environments and hardware peripherals (according to an aspect of an embodiment, for maximum security all hardware should be considered part of the TCB). The TCB of the target platform 100 includes virtualization technology to launch the virtual machine, such as a virtual machine monitor (VMM). Additionally, the TCB should provide isolation between environments 102a-n, report integrity of the TCB faithfully to the hardware trust anchor 200, include safe storage for keys and enforce the assignment of the trust anchor to a specific environment for communication.
[0032] The environment 102 can be real and/or a virtual machine containing the software, operating system and non-transient data required for the user to perform activities. According to an aspect of an embodiment, the VM is only modifiable through an updating process involving the hardware trust anchor. Otherwise, the virtual machine is immutable. The environment 102 contains mechanisms to communicate with the hardware trust anchor 200, for reporting its state and storing the user created data.
[0033] The user data 104 includes user related data, including any data, such as documents created and modified by the user. These documents abide by the policies set forth by the administrator, which will be enforced by the environment 102 and the hardware trust anchor 200. The user data 104 could be stored and protected either within the hardware trust anchor, within the target platform 100 and/or reside remotely in other computers.
[0034] The hardware trust anchor 200 can be an external entity from the target platform 100 and/or an internal independent integrated entity of the target platform 100 used to verify the target platform 00, secure user data 104, authenticate the user and administrator, and convey trust state information of the target platform 100 and/or the environment 102 to the user. The hardware trust anchor 200 requires a communication channel to collect security related audit data, such as measurements, from the target platform 100, and for delivering any user data 104 to the environment 102.
[0035] According to an aspect of an embodiment, the hardware trust anchor 200 can independently audit the target system 100, independent security auditing referring to actively collecting audit related data with minimized or without target platform 100 interaction. This independent security auditing, however, is only possible by plugging the hardware trust anchor 200 into direct access buses, such as PCI, or FIREWIRE, where it is possible to access the target platform's 100 resources (memory, hardisk) via specialized transfers, like DMA. See, Jesus Molina and William A. Arbaugh, "Using independent auditors as intrusion detection systems," In Proc. of the 4th International Conference on Information and Communications Security (ICICS'02), pages 291-302, Singapore, December 2002; and Jesus Molina, Houcheng Lee, Sung Lee, and Zhexuan Song, A Mobile Trusted Platform Module (mTPM) Architecture, in Proc. of 2nd Workshop on Advances in Trusted Computing (WATC06), 2006; and Michael Becher, Maximillian Dornseif, and Christian N. Klein, FireWire all your memory are belong to us, in Proceedings of CanSecWest, 2005. However, use of direct access buses might not be advisable depending upon application, because opening these buses to external peripherals for auditing could also create an open door for potential security threats, since the hardware trust anchor may not only read but also write into the target platform's 100 resources. According to an aspect of an embodiment, the hardware trust anchor will receive security audit data, such as measurements from the platform 100 through a trusted channel such as the USB. The security audit data, such as the measurements should provide authentication to prove the security audit data are genuine. The hardware trust anchor can display to the user the trust state information or results of the security audit independently from the target platform 100, for example, by displaying in real-time (live) the trust state or security audit results on the trust anchor 200 and/or on the target platform 100 and/or in other out-of-band display. The clearer the information is presented, the more likely security problems will be prevented.
[0036] The embodiments are based on implementation flexibility, so the different components may be implemented using different technologies. Two existing actors can be in the architecture of the embodiments: The user 106 and the administrator 108. The user 106 has initial control over the target platform 100 and over user data 104, and will be utilizing the environment 102 to work with the user data 104. The administrator 108 creates the environment 102, provides and sets up the hardware trust anchor 200 and makes sure the correct trusted computing base exists on the target platform 100 controlled by the user/owner 106. The relationship between the different components can be seen in Figure 1 , where the components controlled by the user 106 are represented by solid lines and the components controlled by the administrator 108 are represented with dashed lines.
[0037] FIG. 2 is a flowchart of reporting trust state of a target machine, according to an embodiment of the present invention. In the initial phase 210 the administrator 108
personalizes the trust anchor 200 to the user 106 and binds a computing environment, for example, the environment 102 to the hardware trust anchor 200. In the second phase 220, the user 106 utilizes the hardware trust anchor 200 to verify and install (if necessary) the required TCB 103 to the target platform 100. This operation 220 can also be performed directly by the administrator. After the second phase 220, the user 106 can utilize the target platform 100 with the environment 102.
[0038] In the second phase 220, the hardware trust anchor 200 first verifies the target platform 100 where the environment 102 is to be launched. As the TCB 103 is small, the target platform 100 should be in a limited set of states, which have been previously stored in the hardware trust anchor 200. In the second phase 220, the target platform 100 as a second operation may verify the integrity of the hardware trust anchor 200 to determine if it is a trusted peripheral or not. The second phase 220 verifications of the target platform 100 and the hardware trust anchor 200 may be performed in any order and in any combinations. If any of these two verifications of the target platform 100 and the hardware trust anchor 200 fail, the hardware trust anchor 200 will perform diverse actions depending on policy as discussed herein, . Regardless of the result, the actions performed by the hardware trust anchor should be displayed to the user 106.
[0039] Upon successful verification, at 230, the hardware trust anchor 200 executes a security audit of the target platform 100, for example, the hardware trust anchor 200 controls so the software environment 102 is measured by the target platform 100 to be checked by the hardware trust anchor 200. Once the 'trust state' of the target platform 100 is established, at 240, the environment 102 will then become immutable by the trust anchor 200 continuously monitoring and reporting to the user the trust state of the target platform 100. For example, at 240, the hardware trust anchor 200 can ensure that only the previously measured environment 102 have access to the user data 104.
[0040] According to an aspect of an embodiment, a measurement might be complex or time consuming, as the environment 102 can be a large VM. Measurements of large virtual machines are discussed herein and in the copending US Patent Application no. 12/246, 144, which is incorporated herein by reference.
[0041] At 210, as part of binding, the target platform 100 assigns the hardware trust anchor 200 only to the software environment 102, either real or virtual, launched at 210, hence forbidding other, for example, subsequently launched real and/or virtual software environments, in the target platform 100 from communicating with the hardware trust anchor 200. At 230, after successful user authentication, the user data is unlocked, making documents available and personalizing the environment for the user 106.
[0042] At 240, the software environment 102 will communicate the security state to the hardware trust anchor 200 (e.g. programs launched, etc), so an attacker will not be able to fool the user 106 into utilizing a similar but malicious environment on the target platform. According to an aspect of an embodiment, any data created in the (safe or trusted) environment 102 will automatically be stored in the hardware trust anchor 200 to prevent misuse by other software environments and possible data leakage.
[0043] So far in a policy including two possibilities (allow or deny) has been described. The hardware trust anchor 200, however is not limited to this black and white approach. For example, the hardware trust anchor 200 could select a proper environment depending on the software audit results, for example, measurements received from the target platform 100, or selectively release user data depending on policy. Thus, the hardware trust anchor is capable of implementing a richer security policy and add flexibility to the administrator,
[0044] Once the user 106 is done working with the environment 102, the user 106 should remove the hardware trust anchor 200 from the target platform 200, which in turn should erase the memory traces left by the environment 102 (e.g. shut the environment 102 down, reboot the environment 102).
[0045] FIG. 3A is a diagram of a computer system according to an embodiment of the present invention. The hardware trust anchor 200 includes a TPM 814a, a Trusted Computing Group (TCG) Software Stack (TSS) 302, key management software/hardware 304, secure storage 306 storing data, for example, user data 104, a user checker/authenticator 816
(software and/or computing hardware), such as a fingerprint/palm sensor and authenticator, and a host security checker 310. The host security checker 310 security audits, for example, controls collection of and/or collects measurements of the target platform 100. The hardware trust anchor 200 can be external or internal in relation to the target platform 100.
[0046] In FIG. 3A, the target host 100 includes a virtualized environment 102. In a non- limiting example, the target host 00 executes a virtual machine monitor (VMM) and hypervisor 320 by XEN, which includes the first guest virtualized operating system "domain 0" or domain zero (Dom 0) 325 that is booted automatically when the hypervisor 320 boots. Dom 0 is given special management privileges and direct access to the physical hardware. After Dom 0, other guest virtualized operating systems can be setup or launched as user virtual machine(s) (VMs) 330a-n. The user VMs 330 can be any operating system, such as MICROSOFT WINDOWS, APPLE OS, LINUX, etc. When at 230 the target host 100 is security audited (e.g., measured), a user VM 330a becomes a trusted VM 330a_T. A launched security auditor 340 can security audit the target host 100, for example, by obtaining or executing the measurements on the target host 100. According to an aspect of an embodiment, the host security checker/control 310 and security auditor 340 can be any combination of one or more software executable by any combination of one or more computer processors of the trust anchor 200 and/or target host 100.
[0047] For the user experience the embodiments focus on an enterprise environment 102, where a user wants to utilize a work environment on a laptop or on a personal desktop. A goal is to secure the mobile virtual environment 102 by making policy decisions transparent but not hidden to the user, keeping the user informed completes the chain of trust and reinforces good security practices.
[0048] The user first attaches or switches on the hardware trust anchor (for example, the external K9 mobile server discussed herein) into a USB port of the selected target machine 100. The target machine 100 contains the required keys and trusted computing base (TCB) (methods and/or controlled or provided hardware/software components) to perform the initial
configuration, namely operation 220 in FIG. 2, will be discussed later). According to an aspect of an embodiment, in FIG. 3, the TCB includes the hypervisor 320, the DomO 325 and BIOS of the target platform 100.
[0049] FIGS. 3B-3C are state diagrams of the computer system in FIG. 3A, according to an embodiment of the present invention. The work environment, denoted as Trusted Virtual Machine in this section (TVM) 330a_T coexists with the user environment, referred as the User Virtual Machine (UVM) 330a. Before connecting the hardware trust anchor 200 to the platform 00, the TVM 330a_T remains transparent to the user, as so is the entire TCB. The virtual machine technology remains transparent to the user 106, giving the user the feeling the user is working in a machine with a single OS executing directly on the physical hardware. This feeling is reinforced by near-native speeds of the UVM 330a.
[0050] After the hardware trust anchor 200 is plugged in or turned on/connected (as the case may be), the DomO detects the hardware trust anchor 200 and at 245a, in cooperation with the initialization routine 247 of the hardware trust anchor 200, DomO launches 245b a virtual machine 330a. At 249, the TCB in cooperation with the security auditor 340 and/or with host security checker/control 310 measures and/or sends the measurements of the target platform 100 to the hardware trust anchor 200. If the hardware trust anchor 200 correctly verifies the measurements, the virtual machine 330a can be deemed or is changed to a trusted state as a TVM 330a_T, and a message is displayed to the user 106 both in the hardware trust anchor 200 and by the TVM 330a_T. Once the hardware trust anchor 200 verifies the measurements, at 350, the TCB can allocate TVM 330a_T shortcuts on the UVM 330a desktop. At the same time, the hardware trust anchor 200 requests biometric authentication from the user, for example, by user checker 816. Upon a correct user authentication, the user data 306 is unlocked, and shortcuts to TVM programs and user data appear on the desktop, The time between user authentication and shortcuts from the TVM 330a_T appearing in the UVM 330a is around 5-10 seconds. This includes all verifications by the hardware trust anchor 200. [0051] When the user clicks on one of the new shortcuts, a program is launched in the TVM 330a_T, and the user can interact with it in the UVM 330a. While the user works with TVM 330a_T based applications, the hardware trust anchor 200 displays the same icon, assuring the user is working in a trusted space. While the two VMs 330a and 330a_T are visually merged on the same desktop, the isolation enforced by the TCB still exists between environments. For example, a keylogger as a malicious software installed on the UVM 330a will not be able to intercept information typed inside programs launched by the TVM 330a_T. Also, a cross site scripting attack in a UVM 330a based browser will not affect the TVM 330a_T based browser, even if both are open at the same time. If a program is closed in the TVM 330a_T the related icon on the hardware trust anchor 200 disappears, informing the user this application is no longer running in the TVM 330a_T.
[0052] The hardware trust anchor 200 acts [ike a "compass," letting the user 106 know which programs are bound to the hardware trust anchor 200. In addition, only programs running in the TVM 330a_T have access to user data 306 stored in the hardware trust anchor 200, so work documents stored in the hardware trust anchor 200 will be only available through the TVM 330aT.
[0053] If, at 230, the hardware trust anchor 200 does not receive measurements , for example, after 5 seconds, the hardware trust anchor 200 will notify the user and perform remediation procedures, such as start acting as a USB thumbdrive, allowing the user to launch the Xclient/Xserver mode of operation for regular work. If, at 230, the measurements are incorrect, the hardware trust anchor 200 wi!l also start a remediation process, for example, in case of an out-of-band hardware trust anchor utilizing the OOB connection or in case of an in- band hardware trust anchor utilizing the target platform machine 100 as an "untrusted" hop, to access an administrator site server (heath check server) to discover if the unknown
measurements are valid. The administrator site can sign this measurement with a private key, and the hardware trust anchor 200 can verify the results by utilizing an embedded public key from the administrator. The technical details of an implementation are discussed next.
[0054] FIGS. 4-6 are flow charts of diagnosing a target platform 100 with an external hardware trust anchor device, according to an embodiment of the present invention, in the example flow charts, a target virtualized software environment 102 of the target platform 100 and only the collection of a measurement of the target platform 100 is described as a security audit of the target platform 100, however, the embodiments are not limited to virtualized software environments 102 and collection of measurements of the target platform 100 as a security audit, but as discussed herein the hardware trust anchor device 200 can verify the health or trust state of a target real software environment 02 and can execute other security audit operations in relation to the target platform 00 including the target software environment 102. In other words, the embodiments are not limited to measurement collection for security diagnosis, and any diagnostic information that includes security diagnostic information can be collected.
[0055] In FIG. 4 at operation 400, a hardware trust anchor (HTA) 200 is activated for the target computing environment 100, for example, plugged into the target computing environment or target PC 100. At 404, it is determined whether the HTA can perform a security audit of the target platform 100, for example, by receiving and/or actively (directly) collecting measurements of the target machine 100. If at 404, measurements cannot be collected, at 406, the target platform 100 verification fails, and at 408 such diagnostic result is displayed on the display 802 of the HTA 200. If at 404, measurements can be collected, at 410 the measurements are received by the HTA 200 and the HTA 200 checks the source of the measurements. At 410, it is determined whether the measurements were collected by TPM 814b of the target platform 100, and if so, at 416, the TPM attestation key is verified. If the measurement source is other than TPM 814b, at 417, the signature of the measurements are verified. At 418, such a signature verification result is displayed for the user on the display 802 of the HTA 200. At 420, it is determined whether the signature verification of the measurement is correct. If at 420, the signature of the measurement cannot be verified, at 408, a failed messaged is displayed. If, at 420, the signature of the measurement is verified, the security audit continues continue at 500 to verify the measurement in FIG. 5. If at 500, the measurement verification is successful, at 418, the success is displayed to the user. If, at 500, the measurement verification fails, at 432 failed measurement verification result is displayed to the user.
[0056] In FIG. 5, at 500, the HTA determines whether the measurement can or should be verified internally. If, for example, the HTA 700 has an OOB connection 714 to a server 710, the security audit continues in FIG. 6 at 600. If the HTA 200 internally verifies the measurements, at 502, the HTA 200 verifies received measurement internally . For example, at 502, if the measurement indicates changes to a particular file or area of memory/storage device, then such indication is used for troubleshooting and/or remediation. At 506, it is determined whether the target platform 100 requires any remediation. If determined at 506 that remediation is required, at 508, it is determined whether there is any patch/cleaner software/data as remediation, and if so, at 510 it is determined whether the patch/cleaner can be pushed to the target platform 100. At 512, the patch/cleaner is pushed to the target platform 100 and executed. At 504, results of patch/cleaner availability and/or whether remediation is possible by pushing the patch/cleaner to the target platform 100, is displayed for the user on a display 802 of the HTA 200.
[0057] In FIG. 6, at 600 the server 710 verifies the measurements and/or the signature verification result of the measurement (as the case may be) sent to the remote server 710. The server 710 verifies the measurements (e.g., by using a signature when available from the TPM 814b, etc.) and at 602, sends the results and/or remediation and/or patches to HTA 200. At 604, the OOB HTA 700 processes measurement verification results and/or remediation received from the server 710. At 606, the HTA 700 determines whether there are any available remediation, such as patches and/or cleaner software, etc., and if so, at 612, a signature of such a patch/cleaner is verified. At 610, a result of verification at 612 and/or whether at 606 there are any patch/cleaner is displayed for the user on display 802 of the HTA 700. At 612, it can also be determined whether a patch/cleaner can be pushed onto the target platform 100, and if so, at 614 the patch/cleaner is pushed to the target platform 100 and executed. If the patch/cleaner cannot be pushed to the target platform 100, at 610, such a result is displayed for the user on display 802 of the HTA 700.
[0058] FIG. 7 is a diagram of a computer system according to an embodiment of the invention. In FIG. 7, an external out-of-band (OOB) hardware trust anchor 700 verifies and maintains security health of a target computing environment 100. The OOB device 700 is inserted into and/or communicably connected to the target computer 100, and the target computer 100 launches a security auditor 340, for example, an internal measurement collection program for collecting the state of the target platform 100. One alternative method is for the target system 100 to launch a security auditor 340 that is hosted in the OOB hardware trust anchor device 700, for example, by masking the device 700 as a storage device (e.g., a CD- ROM, USB device, etc.) and execute the security auditor 340.
[0059] Another alternative is for the OOB hardware trust anchor 700 itself starts a security auditor 310 that can directly collect the state of the target system 100. This is possible with connectors such as F!REWIRE that have demonstrated capabilities for direct access to target system 100 memory and resources. [0060] After this, the target system 100 under verification sends the collected data to the portable device 700 or the data is collected by the portable device 700 (as the case may be). The portable device 700 will verify the results, by a host security diagnostic software 310 and/or in cooperation with health check server 710, and suggest remediation to the user using its own display mechanism. For example, the display 802 in the portable device 700 can show "You have two viruses." The notification should be clear so even novice users could clearly understand the state of the target system 100 under verification and the necessary steps to remediate the reported problems.
[0061] In FIG. 7, the OOB hardware trust anchor 700 is in wire or wireless network 712 communication with the target computing environment (e.g., a PC) 100 and controls security diagnosis of the target computing environment 100. Out-of-band (OOB) refers to a computing environment independent or exclusive of a target computing environment 100. . According to an aspect of an embodiment, OOB includes an OOB network connection, which is another network connection to connect to a remote device 710 and independent or exclusive of a network connection used by the target computing environment 100. According to an aspect of an embodiment, security diagnosis refers to any diagnosis related to operation of a computing environment, including (without limitation) malicious software detection/anti malicious software procedures, computing environment configuration/setting/properties management (retrieval, setting, analysis), measurement of computing environment, etc.
[0062] According to an aspect of an embodiment, the OOB hardware trust anchor 700 is an out-of-band security health check verifier or security diagnoser, which can be an external security diagnostic computing device, for example, a handheld computing device security health check verifier 700, which is configured to output information, for example, via a display 802, and configured to wire or wireless network 714 communicate out-of-band (OOB) in relation to the target machine 100, with a another computing apparatus/device 710. In most cases, this will be an offload for the health check verifier 700, to prevent tampering and trickery from malicious software, for example, a virus. In other words, the external OOB connection 714 is not related to or is exclusive of the target machine's network connection 712. In no case the out-of-band diagnoser, for example, external diagnostic device (e.g., handheld diagnostic device) 700 can be affected by the state of the target machine 100. According to an aspect of an embodiment, the out-of-band diagnoser 700 is trusted. [0063] Using an external diagnostic device as a nonlimiting example, a portable OOB security verifier or security diagnostic device 700 with user interaction capabilities (integrated display, etc.) is connected to a target platform 100 using an exiting connector 712, such as USB or FIREWIRE. Typical OOB security verifier devices 700 are the ones that the user is more likely to trust, such as an IPOD or cell phones, and/or have been verified to be trusted. For example, IPOD or a mobile phone might be deemed a trusted device, for example, by a user 106, by having a higher network isolation characteristic in relation to the target machine 100, for example, a desktop computer 100.
[0064] The OOB security verifier device 700 may include the required diagnosis software, namely anti-malicious software, measurement collector, etc., already stored in a repository (computer readable recording media) 716 of the OOB security verifier device 700, or the OOB security verifier device 700 can first download some stored security health check software 310 via the OOB connection 714 from the security health check server 710 that provides the security health check capabilities. As an alternative, an anti-virus vendor might sell the anti-virus software for the OOB security verifier device 102 as part of the anti-virus software.
[0065] As an alternative, a single-purposed external and/or internal hardware 200, 700 can be designed and used for verifying or diagnosing the security health of the target system 100 where it is plugged or in which it is activated. This will work like a "digital thermometer" of the target system 100, much in the same fashion that fever is measured to look for diseases in humans.
[0066] According to an aspect of an embodiment the collected data can come either from trusted sources, such as an embedded black box (e.g. TPM 814) or from untrusted sources, such as software 310, 340 running in the system whose result might be tampered by malicious software (e.g., malware, virus). The portable device 200, 700 can provide the user with estimation on confidence of these security diagnostics depending on the mechanism it uses to collect the information. For example, if the results are backed by a trusted hardware such a TPM 814, it can show "very high confidence" along the results. If the results come from a virtual machine monitor/manager 330, it can display "high confidence". If the results are provided by the host security checker 310 and/or security auditor 340 in cooperation with off the shelf antivirus software, it can show "low confidence", and so on.
[0067] There exist different techniques to verify the quality of the data source. Embedded devices, such as a TPM 814, can sign the report using certified private keys. This will demonstrate the integrity of the report itself to the security verifier device 200, 700. If the host security checker 310 and the security auditor 340 come from the same source (such as in the case the anti-virus vendor provides both) both programs can authenticate each other by means of keyed hashes, such as HMAC. In this case, the host security checker software 310 in charge of controlling collection and/or collecting security data from the target host 100 will create a keyed hash of the report using a pre-shared key between the software running 340 in the host 100 and the software 310 running in the security verifier device 200, 700. Hence, the software 310 in the security verifier device 200, 700 could verify the validity of the report by recreating the keyed hash. In general, any cryptographic verification technique (HMAC, signing keys) can be used by the target host computer 100 to demonstrate trust to the receiving security verifier device 200, 700.
[0068] According to an aspect of an embodiment, if the portable security verifier device is a portable OOB security verifier device 700 that has external connection capabilities (such as WIFI, or cellular network), the final verification can be done in a remote server 710 too, and remediation tools, such as malware cleaners, can be downloaded in the verifier device 700 and later pushed into the target system 100 under verification. This works much in the same fashion as a doctor providing pil!s to a patient once a diagnostics is provided.
[0069] According to an aspect of an embodiment, the hardware trust anchor or security diagnoser device 200, 700 performs combinations of diagnosis depending upon accessibility determination to the target computing environment and guides the user actions. The hardware trust anchor operations include one or more diagnostic actions of (1 ) upon being recognized by diagnostic information collector 340 in the target environment 100, the hardware trust anchor 700 receives diagnostic information (e.g., collect information on memory, operating system, initialization/registry files, storage device, measurements of files for detecting changes in the files, etc.) for analysis (detection of changes in files, malicious software detection,
etc.)/remediation based thereon; (2) if the hardware trust anchor can be recognized as a storage device, execute a diagnostic information collector 340; (3) if the target environment 100 operating system is determined to be corrupted or not operational, reboot the target
environment 100 with another operating system to collect information of the target environment; (4) in response to a failed OS of the target computing environment 100 or otherwise, install and/or utilize a pre-installed virtual machine monitor/manager (VMM) on the target environment 100 to launch a virtual machine (VM) collecting the diagnostic information; (5) in the event the VM is infected, control/manage the VMM as a diagnostic information collector 340 to diagnose the VM, because the VMM has access to all information supporting execution of the VM; and (6) in the event if the target environment 100 operating system is determined to be corrupted or not operational, establish a connection that directly collects the state of the target system 100, such as memory, resources, files, device, etc., for example, FIREWIRE, etc.
[0070] Any combinations of diagnostic actions are performed. According to an aspect of an embodiment, the hardware trust anchor interactively guides the user through the diagnostic actions, according to diagnostic information of the target computing environment 100 and/or remediation information received from the OOB connection 714 (as the case may be).
According to an aspect of an embodiment, the hardware trust anchor is exclusive or
independent by not executing anything from the target computing environment 100 or only executing host security checker software 310, providing a benefit of being protected from infections from the target computing environment 100. According to an aspect of an
embodiment, the hardware trust anchor is read-only. According to an aspect of an embodiment, the hardware trust anchor is a read-only virtual machine. There are several ways to achieve this read-only feature of the hardware trust anchor, namely implement the hardware trust anchor as a VM, and certain VMMs support this read-only function by restoring the VM images back to initial state after turning off the VMM, and/or controlled via the file system by, for example, before launching the VM image, creating a snapshot of the VM image, and after turning off the VMM, restore to the snapshot. Or in case the hardware trust anchor is an external computing device, set the device as read-only or non-writable.
[0071] Common users are afraid to even touch their computer once they believe the computer has been infected by a virus. Splashing screens and other malware techniques reduce user confidence in the infected system. A benefit of the embodiments, that verification with the aid of an out-of-band external device is more likely to provide non-technical users with confidence that the diagnostic is correct, and will also help on ensuring the user understand the necessary operations for remediation. Further, if the user uses an out-of-band external device which is highly trusted, such as an !POD or a Phone (e.g., a mobile phone) to provide the system diagnostics and remediation, the user is more likely to clean the system by performing the suggested actions, making it easy and convenient to repair the system.
[0072] According to an aspect of an embodiment, the external hardware in-band trust anchor is a handheld device health check ('trust state') verifier configured to output information, for example, via a display, and configured to in-band security audit the target computing system without another communication connection in relation to previously or existing established communication with the target machine. In most cases, this will be an offload for the health check verifier, to prevent tampering and trickery from virus. The embodiments substantially ensure that the external hardware in-band trust anchor (e.g., handheld OOB diagnostic device) cannot be affected by the state of the target machine.
[0073] According to an aspect of an embodiment, the external hardware OOB trust anchor is a handheld device health check ('trust state') verifier configured to output information, for example, via a display, and configured to wire or wirelessly communicate out-of-band (OOB connection), which is an independent communication in relation to or exclusive of a previously or existing established communication with the target machine, with another computing apparatus/device and OOB security audit the target computer machine. In most cases, this will be an offload for the health check verifier, to prevent tampering and trickery from virus. In other words, the OOB connection is not related to or is independent of and/or exclusive of the target machine's connection with a network. The embodiments substantially ensure that the external hardware OOB trust anchor (e.g., handheld in-band diagnostic device) cannot be affected by the state of the target machine.
[0074] In case of the external hardware OOB trust anchor, a benefit is use of a familiar device, such as an IPOD, as an external hardware OOB diagnostic device to verify and display the results of any diagnosis of a target computing environment, for example, antivirus collection, providing information related to a 'trust state' of the target computing environment, and suggest or implement remediation techniques. A benefit of the embodiments is OOB diagnosis of the target computing environment when the network connection of the target computing
environment is disabled and/or not functioning, for example, because of malicious software. According to an aspect of an embodiment, the external hardware OOB diagnostic device performs combinations of diagnosis depending upon accessibility determination to the target computing environment.
[0075] Other example benefits of the embodiments for target virtualized machines can be as follows. 1 . a general architecture for securing virtual machines based on a hardware trust anchor. The security problems of mobile virtual machines are addressed while remaining flexible in possible implementations, since the hardware trust anchor can be embodied in different candidate mobile devices, such as a mobile/portable computer, a USB drive with a CPU, a mobile phone, or a specifically designed device. 3. a practical user experience is provided, stressing the practicality of the embodiments, by providing an embodiment based upon a hardware trust anchor in a specialized single purpose embedded device, created drivers and software for communication between the target virtual machine and the hardware trust anchor, and modifications to a virtual machine monitor, for example, the XEN virtual machine monitor to improve both its security and usability.
[0076] FIG. 8 is a functional block diagram of a computer for the embodiments of the invention, namely the computer is an example of an external hardware trust anchor device 200 as the health check verifier. Further, the computer can be an example of a target machine or target computing environment 100. In FIG. 8, the computer can be any computing device. Typically, the computer includes a display or output unit 802 to display a user interface or output information or indications, such as a diode, A computer controller 804 (e.g., a hardware central processing unit) executes instructions (e.g., a computer program or software) that control the apparatus to perform operations. Typically, a memory 806 stores the instructions for execution by the controller 804. A Trusted Platform Module (TPM) 814 can be provided. According to an aspect of an embodiment, the apparatus reads/writes/processes data of any computer readable recording media 810 and/or communication transmission media interface 812. The user authenticator 816 can be finger print/palm sensor, or other software/computing hardware for authenticating a user. The display 802, the CPU 804 (e.g., hardware logic circuitry based computer processor that processes instructions, namely software), the memory 806, the computer readable media 810, the communication transmission media interface 812, TPM 814 and user authenticator 816 are in communication by the data bus 808. Any results produced can be displayed on a display of the computing hardware.
[0077] Therefore, according to an aspect of the embodiments of the invention, any combinations of one or more of the described features, functions, operations, and/or benefits can be provided. A combination may include only one or may include two or more. The embodiments can be implemented as an apparatus (a machine) that includes computing hardware (i.e., computing apparatus), such as (in a non-limiting example) any computer that can store, retrieve, process and/or output data and/or communicate (network) with other computers. In addition, an apparatus can include one or more apparatuses in computer network
communication with each other or other apparatuses. In addition, a computer processor can include one or more computer processors in one or more apparatuses or any combinations of one or more computer processors and/or apparatuses. An aspect of an embodiment relates to causing one or more apparatuses and/or computer processors to execute the described operations. The results produced can be displayed on the display.
[0078] A program/software implementing the embodiments may be recorded on computer- readable recording media. Examples of the computer-readable recording media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or volatile and/or non-volatile semiconductor memory (for example, RAM, ROM, etc.). Examples of the magnetic recording apparatus include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT). Examples of the optical disk include a DVD (Digital Versatile Disc), DVD-ROM, DVD- RAM (DVD-Random Access Memory), BD (Blue-ray Disk), a CD-ROM (Compact Disc - Read Only Memory), and a CD-R (RecordableVRW.
[0079] The program/software implementing the embodiments may also be
included/encoded as a data signal and transmitted over transmission communication media. A data signal moves on transmission communication media, such as wired network or wireless network, for example, by being incorporated in a carrier wave. The data signal may also be transferred by a so-called baseband signal. A carrier wave can be transmitted in an electrical, magnetic or electromagnetic form, or an optical, acoustic or any other form.]
[0080] All examples and conditional language recited herein are intended for pedagogical objects to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment(s) of the present inventions have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.

Claims

CLAIM(S) What is claimed is:
1 . A method of securing a target computing environment, comprising:
communicably activating for the target computing environment a hardware trust anchor device;
establishing, by the hardware trust anchor device, a trust state of the target computing environment, by security auditing the target computing environment based upon a binding of the hardware trust anchor to the target computer environment and obtaining of security diagnostic information from the bound target computing environment; and
continuously maintaining the trust state of the target computing environment.
2. The method according to claim 1 , wherein the binding of hardware trust anchor comprising:
launching by the hardware trust anchor a virtual machine on the target computing device;
measuring the launched virtual machine for establishing a trusted virtual machine; and causing execution of operations for enforcing, monitoring and/or reporting by the hardware trust anchor of an established security policy for the target computing device including the trusted virtual machine.
3. The method according to claim 1 , wherein the binding of the hardware trust anchor to the target computer environment comprises causing execution of operations for enforcing, monitoring and/or reporting by the hardware trust anchor of an established security policy for the target computing device.
4. The method according to claim 2, wherein the security policy comprises limiting modification of the trusted virtual machine and/or limiting execution in the trusted virtual machine to a target process.
5. The method according to claim 4, wherein the security policy comprises enforcing assignment of the hardware trust anchor to a specified trusted virtual machine.
6. The method according to claim 1 , wherein the continuous maintaining of the trust state of the target computing device comprises providing a live feedback of the trust state to a user.
7. The method according to claim 6, wherein the live feedback comprises providing information of launched applications in the computing environment.
8. The method according to claim 1 , wherein the security diagnostic information includes a measurement of the target computing environment.
9. The method according to claim , wherein the continuously maintaining of the trust state of the target computing environment comprises:
establishing an out-of-band communication with a server; and
maintaining the trust state of the target computing environment, including performing the security diagnosing and executing a security remediation process for restoring the trust state, in cooperation with the server.
10. An apparatus for securing a target computing environment, comprising:
a computer processor executing
establishing a trust state of the target computing environment, by security auditing the target computing environment based upon a binding of the hardware trust anchor to the target computer environment and obtaining of security diagnostic information from the bound target computing environment; and
continuously maintaining the trust state of the target computing environment.
11. A method, comprising:
using a hardware trust anchor device
verifying a target computing environment based upon a measurement of the target computing environment;
establishing in the verified computing environment a trusted computing base (TCB) including launching a virtual machine; and
maintaining a trust state of the target computing environment by binding the hardware trust anchor to the virtual machine of the TCB according to a continuous security audit of the target computing environment.
PCT/US2010/043550 2009-09-09 2010-07-28 Hardware trust anchor WO2011031387A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN2010800377652A CN102687118A (en) 2009-09-09 2010-07-28 Hardware trust anchor
EP10815793A EP2476057A1 (en) 2009-09-09 2010-07-28 Hardware trust anchor
JP2012528796A JP5510550B2 (en) 2009-09-09 2010-07-28 Hardware trust anchor

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/556,148 2009-09-09
US12/556,148 US8505103B2 (en) 2009-09-09 2009-09-09 Hardware trust anchor

Publications (1)

Publication Number Publication Date
WO2011031387A1 true WO2011031387A1 (en) 2011-03-17

Family

ID=43648582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2010/043550 WO2011031387A1 (en) 2009-09-09 2010-07-28 Hardware trust anchor

Country Status (5)

Country Link
US (1) US8505103B2 (en)
EP (1) EP2476057A1 (en)
JP (1) JP5510550B2 (en)
CN (1) CN102687118A (en)
WO (1) WO2011031387A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9589128B2 (en) 2012-12-14 2017-03-07 International Business Machines Corporation User trusted device for detecting a virtualized environment

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140373144A9 (en) * 2006-05-22 2014-12-18 Alen Capalik System and method for analyzing unauthorized intrusion into a computer network
US8739292B2 (en) * 2008-03-04 2014-05-27 Apple Inc. Trust exception management
US20120044538A1 (en) * 2009-05-06 2012-02-23 Hewlett-Packard Development Company, L.P. System and method for printing via virtual machines
US8332496B2 (en) * 2009-09-23 2012-12-11 International Business Machines Corporation Provisioning of operating environments on a server in a networked environment
US9774630B1 (en) * 2009-09-28 2017-09-26 Rockwell Collins, Inc. Administration of multiple network system with a single trust module
US8499304B2 (en) * 2009-12-15 2013-07-30 At&T Mobility Ii Llc Multiple mode mobile device
WO2011091313A1 (en) * 2010-01-22 2011-07-28 Interdigital Patent Holdings, Inc. Method and apparatus for trusted federated identity management and data access authorization
WO2011152910A1 (en) * 2010-06-02 2011-12-08 Vmware, Inc. Securing customer virtual machines in a multi-tenant cloud
US9106697B2 (en) * 2010-06-24 2015-08-11 NeurallQ, Inc. System and method for identifying unauthorized activities on a computer system using a data structure model
US8458346B2 (en) * 2010-07-30 2013-06-04 Sap Ag Multiplexer for multi-tenant architectures
WO2012023050A2 (en) 2010-08-20 2012-02-23 Overtis Group Limited Secure cloud computing system and method
US20120117143A1 (en) * 2010-11-03 2012-05-10 Paul William Watkinson Computerized system and method for verifying computer operations
US8782791B2 (en) * 2010-12-01 2014-07-15 Symantec Corporation Computer virus detection systems and methods
CN103620612B (en) * 2011-07-12 2016-04-13 惠普发展公司,有限责任合伙企业 Comprise the computing equipment of port and guest domain
KR20130030132A (en) * 2011-09-16 2013-03-26 한국전자통신연구원 Apparatus and method for providing security function in computing system
US9098696B2 (en) * 2011-10-25 2015-08-04 Raytheon Company Appliqué providing a secure deployment environment (SDE) for a wireless communications device
US8782792B1 (en) * 2011-10-27 2014-07-15 Symantec Corporation Systems and methods for detecting malware on mobile platforms
CN104205891B (en) * 2011-12-30 2019-02-26 瑞典爱立信有限公司 Virtual SIM card cloud platform
US8843650B2 (en) * 2012-01-09 2014-09-23 Fujitsu Limited Trusted network booting system and method
US9992024B2 (en) * 2012-01-25 2018-06-05 Fujitsu Limited Establishing a chain of trust within a virtual machine
US8973138B2 (en) 2012-05-02 2015-03-03 The Johns Hopkins University Secure layered iterative gateway
US9230066B1 (en) * 2012-06-27 2016-01-05 Emc Corporation Assessing risk for third-party data collectors
US10607007B2 (en) 2012-07-03 2020-03-31 Hewlett-Packard Development Company, L.P. Micro-virtual machine forensics and detection
EP2901612A4 (en) * 2012-09-28 2016-06-15 Level 3 Communications Llc Apparatus, system and method for identifying and mitigating malicious network threats
US20140137190A1 (en) * 2012-11-09 2014-05-15 Rapid7, Inc. Methods and systems for passively detecting security levels in client devices
US9922192B1 (en) * 2012-12-07 2018-03-20 Bromium, Inc. Micro-virtual machine forensics and detection
US9167002B2 (en) 2013-08-15 2015-10-20 Microsoft Technology Licensing, Llc Global platform health management
US10013563B2 (en) * 2013-09-30 2018-07-03 Dell Products L.P. Systems and methods for binding a removable cryptoprocessor to an information handling system
US9734325B1 (en) * 2013-12-09 2017-08-15 Forcepoint Federal Llc Hypervisor-based binding of data to cloud environment for improved security
US10389709B2 (en) * 2014-02-24 2019-08-20 Amazon Technologies, Inc. Securing client-specified credentials at cryptographically attested resources
US10362136B2 (en) * 2014-08-20 2019-07-23 Visa International Service Association Device profile data usage for state management in mobile device authentication
KR20170046713A (en) * 2014-08-22 2017-05-02 노키아 솔루션스 앤드 네트웍스 오와이 Trust anchor update in a public key infrastructure
WO2016067473A1 (en) * 2014-10-31 2016-05-06 富士通株式会社 Security system and method of communication between computer devices
EP3243313B1 (en) 2015-01-07 2020-09-16 GoSecure Inc. System and method for monitoring a computer system using machine interpretable code
US9509587B1 (en) * 2015-03-19 2016-11-29 Sprint Communications Company L.P. Hardware root of trust (HROT) for internet protocol (IP) communications
US9729572B1 (en) * 2015-03-31 2017-08-08 Juniper Networks, Inc. Remote remediation of malicious files
US10650142B1 (en) * 2015-06-24 2020-05-12 Ca, Inc. Systems and methods for detecting potentially malicious hardware-related anomalies
US11113086B1 (en) * 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10395029B1 (en) 2015-06-30 2019-08-27 Fireeye, Inc. Virtual system and method with threat protection
US10216927B1 (en) 2015-06-30 2019-02-26 Fireeye, Inc. System and method for protecting memory pages associated with a process using a virtualization layer
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10033759B1 (en) 2015-09-28 2018-07-24 Fireeye, Inc. System and method of threat detection under hypervisor control
US9967745B2 (en) 2016-02-02 2018-05-08 Sprint Communications Company L.P. Hardware-trusted network bearers in network function virtualization infrastructure (NFVI) servers that execute virtual network functions (VNFS) under management and orchestration (MANO) control
US10467402B2 (en) * 2016-08-23 2019-11-05 Lenovo (Singapore) Pte. Ltd. Systems and methods for authentication based on electrical characteristic information
US11750654B2 (en) * 2018-04-25 2023-09-05 Dell Products, L.P. Integrity assurance of a secured virtual environment
RU2748963C2 (en) * 2019-07-17 2021-06-02 Акционерное общество "Лаборатория Касперского" System and method for detecting service operation problems in a data transmission network comprising virtual machines
RU2747465C2 (en) * 2019-07-17 2021-05-05 Акционерное общество "Лаборатория Касперского" System and method for troubleshooting functioning of services in data network containing virtual machines
US11599522B2 (en) * 2019-10-29 2023-03-07 EMC IP Holding Company LLC Hardware trust boundaries and graphs in a data confidence fabric
CN114651240A (en) * 2019-11-22 2022-06-21 惠普发展公司,有限责任合伙企业 Security check
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
US12106133B2 (en) * 2020-11-11 2024-10-01 Intel Corporation Method and apparatus for trusted devices using Trust Domain Extensions
US11803454B2 (en) * 2021-04-30 2023-10-31 Dell Products L.P. Chained loading with static and dynamic root of trust measurements
US11784807B2 (en) 2021-06-01 2023-10-10 Cisco Technology, Inc. Binding an ASIC to a trust anchor
US11816219B2 (en) 2021-06-01 2023-11-14 Cisco Technology, Inc. Binding a trust anchor and an ASIC
US12072981B2 (en) 2021-06-01 2024-08-27 Cisco Technology, Inc. Using a trust anchor to control functionality of an ASIC
US11928210B2 (en) * 2022-03-02 2024-03-12 Flexxon Pte. Ltd. Module and method for monitoring systems of a host device for security exploitations
US12105808B2 (en) * 2022-03-31 2024-10-01 Drata Inc. Automated trust center for real-time security and compliance monitoring

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050033987A1 (en) * 2003-08-08 2005-02-10 Zheng Yan System and method to establish and maintain conditional trust by stating signal of distrust
US20050039016A1 (en) * 2003-08-12 2005-02-17 Selim Aissi Method for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution
US7131143B1 (en) * 2000-06-21 2006-10-31 Microsoft Corporation Evaluating initially untrusted evidence in an evidence-based security policy manager
US7240202B1 (en) * 2000-03-16 2007-07-03 Novell, Inc. Security context sharing
US20080046758A1 (en) * 2006-05-05 2008-02-21 Interdigital Technology Corporation Digital rights management using trusted processing techniques
US7380119B2 (en) * 2004-04-29 2008-05-27 International Business Machines Corporation Method and system for virtualization of trusted platform modules
US20080141024A1 (en) * 2003-10-17 2008-06-12 Kumar Ranganathan Extended trusted computing base
US20090013406A1 (en) * 2007-04-13 2009-01-08 Hewlett-Packard Development Company, L.P. Dynamic trust management
US20090063857A1 (en) * 2004-04-29 2009-03-05 Bade Steven A Method and system for providing a trusted platform module in a hypervisor environment
US20090172781A1 (en) * 2007-12-20 2009-07-02 Fujitsu Limited Trusted virtual machine as a client

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
GB2384874B (en) * 2002-01-31 2005-12-21 Hewlett Packard Co Apparatus for setting access requirements
US9450966B2 (en) * 2004-11-29 2016-09-20 Kip Sign P1 Lp Method and apparatus for lifecycle integrity verification of virtual machines
JP4732805B2 (en) * 2005-06-03 2011-07-27 株式会社エヌ・ティ・ティ・ドコモ Service usage method and terminal
US20070204153A1 (en) * 2006-01-04 2007-08-30 Tome Agustin J Trusted host platform
US8738786B2 (en) * 2006-05-18 2014-05-27 Sanggyu Lee Method for protecting client and server
DE102006025281A1 (en) * 2006-05-31 2007-12-06 Mitsubishi Polyester Film Gmbh Sealable, biaxially oriented polyester film with hydrophilic coating
US8522018B2 (en) * 2006-08-18 2013-08-27 Fujitsu Limited Method and system for implementing a mobile trusted platform module
JP4818868B2 (en) * 2006-10-05 2011-11-16 日本電信電話株式会社 Quarantine network system using virtual terminal, method for quarantining virtual terminal, and program for quarantining virtual terminal
US8068899B2 (en) * 2007-07-03 2011-11-29 The Board Of Trustees Of The Leland Stanford Junior University Method and system of using intrinsic-based photosensing with high-speed line scanning for characterization of biological thick tissue including muscle
JP4287485B2 (en) * 2007-07-30 2009-07-01 日立ソフトウエアエンジニアリング株式会社 Information processing apparatus and method, computer-readable recording medium, and external storage medium
US20090172871A1 (en) * 2007-10-31 2009-07-09 Bird K Todd Systems and methods for providing a urine deflector shield
US8352740B2 (en) * 2008-05-23 2013-01-08 Microsoft Corporation Secure execution environment on external device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7240202B1 (en) * 2000-03-16 2007-07-03 Novell, Inc. Security context sharing
US7131143B1 (en) * 2000-06-21 2006-10-31 Microsoft Corporation Evaluating initially untrusted evidence in an evidence-based security policy manager
US20050033987A1 (en) * 2003-08-08 2005-02-10 Zheng Yan System and method to establish and maintain conditional trust by stating signal of distrust
US20050039016A1 (en) * 2003-08-12 2005-02-17 Selim Aissi Method for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution
US20080141024A1 (en) * 2003-10-17 2008-06-12 Kumar Ranganathan Extended trusted computing base
US7380119B2 (en) * 2004-04-29 2008-05-27 International Business Machines Corporation Method and system for virtualization of trusted platform modules
US20090063857A1 (en) * 2004-04-29 2009-03-05 Bade Steven A Method and system for providing a trusted platform module in a hypervisor environment
US20080046758A1 (en) * 2006-05-05 2008-02-21 Interdigital Technology Corporation Digital rights management using trusted processing techniques
US20090013406A1 (en) * 2007-04-13 2009-01-08 Hewlett-Packard Development Company, L.P. Dynamic trust management
US20090172781A1 (en) * 2007-12-20 2009-07-02 Fujitsu Limited Trusted virtual machine as a client

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Lecture Notes in Computer Science: Computer Security - ESORICS 2003 8th European Symposium on Research in Computer Security [online], Gjovik, Norway, October 13-15, 2003 [retrieved on 2010-09-01], Proceedings", vol. 2808, article BALDWIN ET AL.: "Hardware Encapsulation of Security Services.", pages: 201 - 216, XP008150963 *
"Lecture Notes in Computer Science: Trust Management, First International Conference [online], iTrust 2003 Heraklion, Crete, Greece, May 28-30, 2003 (retrieved on 2010-09-1], Proceedings", vol. 2692, article BALDW IN ET AL.: "Hardware Security Appliances for Trust.", pages: 46 - 58, XP008150977 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9589128B2 (en) 2012-12-14 2017-03-07 International Business Machines Corporation User trusted device for detecting a virtualized environment
US10229261B2 (en) 2012-12-14 2019-03-12 International Business Machines Corporation User trusted device for detecting a virtualized environment
US10318724B2 (en) 2012-12-14 2019-06-11 International Business Machines Corporation User trusted device for detecting a virtualized environment

Also Published As

Publication number Publication date
JP5510550B2 (en) 2014-06-04
JP2013504804A (en) 2013-02-07
US20110060947A1 (en) 2011-03-10
CN102687118A (en) 2012-09-19
EP2476057A1 (en) 2012-07-18
US8505103B2 (en) 2013-08-06

Similar Documents

Publication Publication Date Title
US8505103B2 (en) Hardware trust anchor
US10516533B2 (en) Password triggered trusted encryption key deletion
US8832778B2 (en) Methods and apparatuses for user-verifiable trusted path in the presence of malware
US8850212B2 (en) Extending an integrity measurement
Garriss et al. Trustworthy and personalized computing on public kiosks
US8335931B2 (en) Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
CN103299311B (en) Methods and apparatus for trusted boot optimization
JP4837985B2 (en) System and method for securely booting a computer having a trusted processing module
US8539551B2 (en) Trusted virtual machine as a client
KR100930218B1 (en) Method, apparatus and processing system for providing a software-based security coprocessor
Rutkowska et al. Qubes OS architecture
EP3005216B1 (en) Protecting anti-malware processes
WO2007066333A1 (en) A practical platform for high risk applications
Futral et al. Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
Mannan et al. Unicorn: Two-factor attestation for data security
Toegl et al. acTvSM: A dynamic virtualization platform for enforcement of application integrity
Sisinni Verification of software integrity in distributed systems
Surve et al. SoK: Security Below the OS--A Security Analysis of UEFI
Cabuk et al. Trusted Integrity Measurement and Reporting for Virtualized Platforms: (Work-in-Progress)
Surie et al. Rapid trust establishment for transient use of unmanaged hardware
Hili et al. The BIOS and Rootkits
Rossow TPM 2.0, UEFI and their Impact on Security and Users’ Freedom
Stumpf et al. An architecture providing virtualization-based protection mechanisms against insider attacks
Informationssäkerhet et al. New Security Challenges

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080037765.2

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10815793

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2010815793

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012528796

Country of ref document: JP