cloud computing.

advertisement
TUTORIAL PROPOSAL
CyberSec2012
SECURITY, TRUST AND PRIVACY
IN
EMBEDDED SYSTEMS
AND
CLOUD COMPUTING.
Research Group Members:
Dr. Jamalul-lail Ab Manan (Project Leader)
Mohd Anuar Mat Isa
Mohd Faizal Mubarak
Hadi Khorasanizadeh
Hamed Khiabani
Farag Elhagari Usama Tharwat Farag Elhagari
1. TITLE
Security, Trust and Privacy in Embedded Systems and Cloud Computing.
2. SUMMARY
Our research group will present tutorials and booths that cover latest research trends
in security, trust and privacy. This research group is joint ventures between researchers
in university and industry such as MIMOS, UITM, UPM, UTM, CSM and etc. The aim of
research group is to promote security technology in defense the national sovereignty.
3. TOPICS
A) Future Challenges in Information Security (Dr Jamal)
Dr Jamalul-lail will present the Future Challenges in Information Security and in
particular issues related to security, trust and privacy in emerging technologies.
He will give an example of the importance of Security, Trust and Privacy (STP) in
two sectors of the country’s economy, i.e. Healthcare and Education. STP will
make its way in all emerging technologies.
B) Fundamental of Trusted Computing (Usama)
Actually, exposure of data on systems, system compromise due to software
attack, lack of user identity assurance for authorization (identity theft), and
physical theft of laptops and computing devices are some examples of the
concerns of information and communication technology (ICT) users and
organizations. The Trusted Computing Group (TCG), which is a not-for-profit
organization, came into existence to respond to this need. The TCG has therefore
chosen the approach of having a physically secure trusted component, Trusted
Platform Module (TPM), in order to design a Trusted Platform (TP). The TPM
works as a root, building block, of trust in TP. In this talk, we will discuss the
concepts of TC, the main features of TP and the TPM security services.
C) Remote Attestation (Faizal)
Today’s computer access techniques can provide security to computer system if
it designed to take into account various threats. In recent years computer threats
are also becoming more dangerous and can easily cause damages to computer
system. Usually, authentication is a very common computer access technique
between remote systems (clients) to the server. Unfortunately, most of the
authentication methods are without system integrity verification and hence
poses system security threat because unverified applications running inside host
platform which can be compromised either by any malicious codes or man in the
middle attack. In order to strengthen the system security of current
authentication system between client and server, integrity verification
(attestation) module should be implemented to create trust between them. The
embedded trusted platform module (TPM) inside the client host and server will
enable system integrity measurements and verifications.
D) Multi Tenancy of Cloud Computing (Hamed & Hadi)
Cloud computing in essence does not provide the required assurance for many
applications. This is the impeding factor holding many players keeping them
away from migrating to a cloud based system. “Trusted Multi-Tenant
Infrastructure Work Group” was formed in 2010 to develop the standards for
implementing Shared infrastructures, Multi-provider infrastructures, Reference
models and implementation guidance and to identify and address gaps in
existing standards. The recently established workgroup is intended to extent the
currently developed specifications from Trusted Network Connect, Trusted
Platform Module and Virtualization workgroups. The objectives of Trusted
Multi-tenant infrastructure is to assist in trust assessment of the cloud service
providers at all times. In this section the necessity for this standard will be
explained. Also trust requirement for utilizing the cloud based infrastructure will
be elaborated.
E) Technical Overviews & Programming for Trusted Platform Module (TPM)
version 1.2 (Anuar)
Trusted Computing Group (TCG) defines some key elements to evaluate
trustworthiness of the hardware and software using root of trust in the security
architecture. The TCG’s Trusted Platform Modules (TPM) specifications are an
industry attempt to build a series of “roots of trust” in a computing platform. To
interface with the TPM chip, the TCG prescribe a standard interface to
communicate with the TPM. With all these specifications coming from the TCG
group, the developer community lacks the understanding of how trusted
platform can be implemented in a system. The main question coming from the
community is “How can we be assured device(s) and system(s) are trusted if we
use trusted computing platform (e.g. TPM) as root of trust?”. In order to answer
this question, we need to refer to its definition, architecture, design and
implementation of trusted platform as mentioned by the TCG. Acquiring full
knowledge of Trusted Computing is a critical success factor to successfully
develop or modify existing application that including design, coding and testing
the TPM based application. This tutorial presents a bridging between the
concepts and practices of the TPM and its related services. Therefore, this
tutorial will clarify the concept of establishing trust and its implementation
(including programming) for a secure platform. The topic for presentation is
Technical Overviews & Programming for Trusted Platform Module (TPM)
version 1.2. The material for presentations and demos are:
 Technical demos for concept and practice of the TPM.
 How to setup a computer system and enabling TPM on the machine.
 Downloading and installing tools for TPM’s Programming.
 Go through TPM Based Services (TBS) API in Windows 7.
 Writing sample C codes through TBS API in Windows 7.
 Compiles and runs TPM Emulator for machine without TPM in Windows 7.
 Compiles and runs Trousers (Trusted Software Stack (TSS)) in Windows 7.
 Writing sample C codes through TSS’s API in Windows 7.
 Hacking the Windows TBS.
* All materials are provided by author. If participant interested to have a copy, they are required
to bring a USB disk around 5 GB for the materials. To do lab programming, the machine must
have TCG’s TPM 1.2 compliant chip and Windows 7. However, participant may use TPM emulator
if their machine did not have a physical TPM chip.
F) Potential Security Trust and Privacy (STP) Projects (Dr. Jamal)
Dr Jamalul-lail will present areas of focus in STP Research. Among the areas that
will be highlighted will cover areas in Education and Healthcare.
G) Booth for Demo the Existing Research Works. (We need 4 tables with 4 Power
Extensions)
a) Remote Attestation for network communication.
b) Trusted Integrity Verification Architecture (IVA) for Windows Operating
Systems.
c) Active Management Technology (AMT) for defense against cyber-terrorism
attacks.
d) Trusted Wireless Sensor Node for preventing node cloning attack in wireless
sensor network.
4. Format and duration (May do adjustment based on organizer schedules)
Title
Introduction to Security, Trust and
Privacy
Fundamental of Trusted Computing
Remote Attestation
Break
Multi Tenancy of Cloud Computing
Technical Overviews & Programming for
Trusted Platform Module (TPM) version
1.2
Future Works
Booth for Demo the Existing Research
Works
Format
Time
Duration
Presentation
9.00-9.15 AM
15 minutes
Presentation
Presentation
Presentation
Presentation
/ Demo
9.15-9.45 AM
9.45-10.15 AM
10.15-10.30 AM
10.30-11.15 AM
11.15-11.45 AM
30 minutes
30 minutes
15 minutes
45 minutes
30 minutes
Presentation
Booth
11.45-12.00 PM
12.00-12.30 PM
15 minutes
30 minutes
5. Organizer CV
Dr Jamalul-lail Ab Manan graduated from University of Sheffield, UK
with a Bachelor in Electrical Engineering (B. Eng). He pursued his
Master of Science (MSc) in Microprocessor Engineering from University
of Bradford, UK and PhD in Communications Engineering from
University of Strathclyde, Glasgow, UK. He has been the Senior Director
at Advanced Information Security Cluster, MIMOS Berhad. He has 17.5
years of experience in teaching Electrical and Electronics,
Microprocessor Engineering and Network Security. He has many years of industrial
experience as Network Engineer, Senior Manager and Senior Vice President in ICT
based government linked companies in Malaysia. In MIMOS Berhad, his current
research focus is Information Security, particularly in Encryption, Trusted Computing,
Privacy Enhancing Technologies. He is currently the Principal Researcher for Privacy
Enhancing Technology research in MIMOS.
Mohd Anuar Mat Isa is a former researcher in the MIMOS Berhad.
Currently, he is doing a full time research as PhD student. Mohd Anuar
has wide experience conducting research and development in Trusted
Computing. His security experience is rooted in Windows Operating
Systems, virtualization and embedded systems. He also a visiting lecturer
and research officer in Faculty Electical Engineering at the UiTM Shah
Alam.
Mohd Faizal Bin Mubarak is currently working at MIMOS as a Staff
Researcher and has been working for almost 15 years and has vast
experiences in telecoms and telecommunications systems. Involve in
various types of research especially in information security. His research
interests are on RFID, sensors, security and privacy, trusted computing,
networking, operating system and secured programming. He has
received professional certificates from EC-Council for Certified Ethical
Hacker on 2009 and Certified Secure Programmer on 2008. He also is
currently doing part-time PhD at UITM, Shah Alam.
Hadi KhorasaniZadeh started working as network administrator and
programmer on various project at the age of 12. Studied bachelor degree
in Telecommunication Engineering (Electrical Engineering) at Amirkabir
University of Tehran. Continued studying in the UK, at Aston Internet
Technology where MSc with distinction in internet technology was
obtained. Soon After, started working as a network security/ Firewall
engineer in Emco Iran consulting engineers for a year before starting his Ph.D. in Malaysia.
His other professional certifications include CISSP, GCIH, CEH, ISO 27001 Implementation,
CCNA and CCNA Security.
Hamed Khiabani is an Information Security expert with over 17 years
hands on experience in IT industry. He received his B.Eng. degree in
computer engineering-hardware from Iran University of Science and
Technology in 1995 and his M. Eng. degree in computer architecture from
Azad University-Science & Research Branch in 1998. He is currently
pursuing his Ph.D. degree in Computer Science (information Security) in
University Technology Malaysia while attached to MIMOS Berhad under a
research collaboration program. Hamed holds CISSP, GPEN, GCIH, GCFA, GSEC, CEH, CHFI
and ISO27001 Lead Auditor certifications and is a Juniper & Fortinet certified engineer. He
is member of GIAC Advisory Board and graduate student member of IEEE.
Usama Tharwat Elhagari is a researcher in The Egyptian Nuclear Research
Centre. He graduated from Elmenufia University, Egypt; with a Bachelor in
Electronic Engineering (Computer Science and Engineering). He got his
Master of Computer Science in Information Security from the Center for
Advanced Software Engineering (CASE),Universiti Teknologi Malaysia
(UTM). He has been a lecturer in Kingdom of Saudi Arabia at different
universities. He has been the system administrator of the physical
protection systems of the second Egyptian research reactor (ETRR-R). He represented his
country, Egypt, in many meetings to discuss the convention revision of nuclear material
physical protection, held at the International Atomic Energy Agency (IAEA), Vienna,
Austria. Currently, he is a PhD candidate in Universiti Teknologi Malaysia (UTM) and he is
attached to the Malaysian Security Evaluation Facility (MySEF) Laboratory, Cyber Security
Malaysia (CSM). His major research interests include computer security, security analysis,
formal methods, physical security systems, RFID, trusted computing and security testing.
6. Expected Participants
15~30 participants from university.
15~30 participants from industry.
7. Significance in relation to the topics of the conference
This research workgroup will focus the presentation and booth regarding these security
issues:
i)
Trusted Computing for PCs, Embedded Systems and Cloud Computing.
ii)
Anonymity (Privacy) for Online Services.
iii)
Critical infrastructure protection from electronic warfare and cyber-terrorism.
iv)
Authentication and access control systems based on Trusted Computing’s
Remote Attestation.
v)
Security policies, trust and identity management for client-server architecture.
8. Details of any previous workshops
i)
ii)
iii)
Trusted Computing & Privacy - Advance Informatics School (AIS), UTM Campus
KL, March 2011.
Trusted Computing – Faculty of Electrical Engineering, UITM Shah Alam, Nov
2009.
2nd Asia Pacific Trusted Infrastructure Summer School 2008 (APTISS’08), KL,
August 2008.
Download