SlideShare a Scribd company logo
Trusted Launch
of Generic Virtual Machine Images
    in Public IaaS Environments

  Nicolae Paladi1*, Christian Gehrmann1,
   Mudassar Aslam1, Fredric Morenius2




     1
         Swedish Institute of Computer Science
                  2
                    Ericsson Research
2



Contents


           1. Infrastructure-as-a-Service
           2. Problem Setting
           3. Attacker Model
           4. Related Work
           5. Protocol Description
           6. Protocol Implementation
           7. Conclusion



                                                              -
                                                         u re
                                                          ct
                                                        ru -
                                                      st a
                                                   fra as- vice
                                                In           r
                                                          Se
3



Infrastructure-as-a-Service
• A 'cloud computing' service model (NIST:2011):



    Provision processing, storage, networks.

    Deploy and run arbitrary software

    No control over underlying cloud infrastructure

    Control over OS, storage, deployed applications.

    Limited control of select networking components.

                                                                 rio
                                                             e na d      s
                                                           Sc an tion
                                                                       i
                                                                    in
                                                                def
4



Scenario and Definitions
                     Scheduler
                        (S)




                  Compute         Compute     Compute
                    Host            Host        Host
                    (CH)            (CH)        (CH)



                 Hardware        Hardware   Hardware
Client (C)                                              f
                                                     rie te
                                                    B o M
                                                      N TP
                                                       on
5


    A Brief Note on TPM
•
   Trusted platform module v1.2 as specified by TCG
•
   v2.0 is currently under review
•
   Tamper-evident
•
  16+ PCRs as volatile or non-volatile storage
Four operations: Signing / Binding / Sealing / Sealed-sign




                                                                   em
                                                               o bl ng
                                                             Pr etti
                                                                S
6


Problem Setting

• “Consumer is able to deploy and run arbitrary software, which can
    include operating systems and applications.”

•
    Client can launch VMs for sensitive computations.

•
    Trusted VM launch – the correct VM is launched in a IaaS
    platform on a host with a known software stack verified to not
    have been modified by malicious actors.

•
    How do we ensure a trusted VM launch in an untrusted
    IaaS environment?
                                                                              er
                                                                        ta c k el
                                                                      At od
                                                                          M
7


Attacker Model


•   (Ar) has root access to IaaS hosts.


•   (Ar) has no physical access.


•   (Ar) has no access to CH's memory.


•   (Ar) can act maliciously or in good faith.
                                                            ck
                                                         tta ario
                                                        A n
                                                            e
                                                         Sc 1
•   (A ) can be a person/malicious software/code bug.
8



Attack scenario 1
                                          Remote Attacker
                       Scheduler
                                                Ar
                          (S)




                    Trusted
                    Compute         Compute
                      Host            Host
                     (CH)             (CH)



                Hardware           Hardware   Hardware
Client (C)                                                ck
                                                       tta ario
                                                      A n
                                                          e
                                                       Sc 2
9



Attack scenario 2
                                  Remote Attacker
                                        Ar




                            Compute     Compute
                              Host        Host
                              (CH)        (CH)



                Hardware   Hardware   Hardware
Client (C)                                          ed
                                                 lat rk
                                               Re o
                                                  W
10


Related Work




                           d
                      u ste d
                    Tr hir ty
                       T ar
                           P
11


Trusted VM Launch Protocol:
Trusted Third Party
•
    Trusted Third Party (TTP) – trusted by C and IaaS, able
    to assess the SP of CH according to predefined guidelines.

•
    Security profile (SP) – verified setup of an VM, trusted by
    the Participants.

•
    Currently no fine-grained scale of SP available.

•
    Limited to only matching the measurements with
    reference values.
                                                                    g
                                                                 Bi e
                                                                e r
                                                              Th ictu
                                                                P
The big picture
                    3.
                               (S)


   1.
                                     4.
                                          5.

         2.
               CH         CH         CH
                                               6.

                                HW
              HW         HW      +
                                TPM                         l
Client (C)                                               c o ion
                                                       to t
                                                     ro crip
                                                    P s 1)
                                                       e (
                                                     D
13


Trusted VM Launch Protocol:
Protocol Details (1)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 2)
                                      e (
                                    D
14


Trusted VM Launch Protocol:
Protocol Details (2)




                                          l
                                        co ion
                                      to t
                                    ro rip
                                   P sc 3)
                                      e (
                                    D
15


Trusted VM Launch Protocol:
Protocol Details (3)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 4)
                                      e (
                                    D
16


Trusted VM Launch Protocol:
Protocol Details (4)




                                                   k
                                             S tac
                                         n
                                    pe
                                   O
18


Trusted VM Launch Protocol:
OpenStack
•
    Protocol was implemented in OpenStack
•
    Open Source IaaS deployment and management
    platform.
•
    Large user base and multiple industry contributors
•
    “Essex” release as baseline.
•
    Aimed to have a minimal footprint in terms of code
    modifications.
•
  Implementation changed 4 components
involved in the launch process (presented next).                   l n
                                                                 co atio
                                                               to t
                                                            r o en
                                                           P m )
                                                               e
                                                             pl (1
                                                         Im
19


Trusted VM Launch Protocol:
Protocol Implementation (1)
Affected components:

•
    Nova SQL db – global security profile per compute host.

•
 Dashboard – request compute host attestation, minimum
SP, TTP’s URL and Token upload.

•
 Scheduler – SimpleScheduler to schedule VM launches on
trusted CH with the requested–or stricter–SP.

•
 Nova compute – support communication with TPM through
TSS, encryption/decryption and VM image integrity
assessment.                                                              l        n
                                                                       co tatio
                                                                    to
                                                                 ro en
                                                                P e m 2)
                                                                  pl (
                                                               Im
20


Trusted VM Launch Protocol:
Protocol Implementation (2)
•
    TrustedComputingPools (currently in blueprints)
    will introduce TPM support in OpenStack

•
    Trusted IaaS provider with untrusted nodes.

•
    Node attestation offered as “premium service”.

•
    Node attestation performed by IaaS provider itself.

                                                                            n
                                                                      u si o
                                                             n   cl
                                                          Co
21



Conclusion
•
    A trusted VM launch protocol available assuming
    an untrusted IaaS platform + TPM + physical
    security of the hosts.

•
    Fairly close to ongoing industrial implementation
    but offers stricter security guarantees.

•
    Fine-grained attestation process on the TTP side
    still a research challenge.

More Related Content

PDF
XS Boston 2008 Paravirt Ops in Linux IA64
PDF
Ncm2010 ruo ando
PDF
Tcpip (Dharmender Kumar) 09990478253
KEY
RIPE: Runtime Intrusion Prevention Evaluator
PDF
Shellcoding, an Introduction
PDF
Implement Checkpointing for Android (ELCE2012)
PDF
RISC-V Linker Relaxation and LLD
PDF
Gareth edwards xilinx
XS Boston 2008 Paravirt Ops in Linux IA64
Ncm2010 ruo ando
Tcpip (Dharmender Kumar) 09990478253
RIPE: Runtime Intrusion Prevention Evaluator
Shellcoding, an Introduction
Implement Checkpointing for Android (ELCE2012)
RISC-V Linker Relaxation and LLD
Gareth edwards xilinx

What's hot (13)

PDF
深入淺出C語言
PDF
Design and Implementation of 64 Bit RISC Processor Using System.pdf
PDF
Pragmatic optimization in modern programming - modern computer architecture c...
PDF
CMPP 2012 held in conjunction with ICNC’12
PDF
Memory, IPC and L4Re
PDF
Parallel R
PDF
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
PDF
gcov和clang中的实现
PPTX
小型安価なFPGAボードの紹介と任意波形発生器
PDF
Smashing The Stack
PDF
A CGRA-based Approach for Accelerating Convolutional Neural Networks
PPTX
Workshop NGS data analysis - 3
PDF
Advanced Components on Top of L4Re
深入淺出C語言
Design and Implementation of 64 Bit RISC Processor Using System.pdf
Pragmatic optimization in modern programming - modern computer architecture c...
CMPP 2012 held in conjunction with ICNC’12
Memory, IPC and L4Re
Parallel R
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
gcov和clang中的实现
小型安価なFPGAボードの紹介と任意波形発生器
Smashing The Stack
A CGRA-based Approach for Accelerating Convolutional Neural Networks
Workshop NGS data analysis - 3
Advanced Components on Top of L4Re
Ad

Viewers also liked (20)

PPT
New Pr Ofesy Conference Presentation
PDF
Launch phases generic pharma
PDF
Barker Creek Heirloom Seeds and Rare Seeds
PDF
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
PDF
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
PDF
Lund security workshop_presentation
PDF
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
PDF
Scroll and key annual appeal 2 nl
PDF
Scroll and key annual appeal 1 nl
PDF
Central Texas Community Gardening Manual - World Hunger Relief
PDF
Custom Android Code Templates
PDF
Basic List of Companion Plants - Chico, California
PDF
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
PDF
Brand Plan for the launch of Brand-X
PDF
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
PDF
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
PDF
Alley Cropping in Agro Forestry - University of Missouri
PPT
Glenmark analyst ppt
PPTX
generic drugs
PDF
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
New Pr Ofesy Conference Presentation
Launch phases generic pharma
Barker Creek Heirloom Seeds and Rare Seeds
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
Lund security workshop_presentation
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
Scroll and key annual appeal 2 nl
Scroll and key annual appeal 1 nl
Central Texas Community Gardening Manual - World Hunger Relief
Custom Android Code Templates
Basic List of Companion Plants - Chico, California
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
Brand Plan for the launch of Brand-X
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
Alley Cropping in Agro Forestry - University of Missouri
Glenmark analyst ppt
generic drugs
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Ad

Similar to Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments (20)

PPTX
Private cloud day session 5 a solution for private cloud security
PPTX
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
PPTX
Denial of Service in Software Defined Netoworks
PDF
Cybera - Clouds & other computational frameworks for science
PPTX
BayThreat Why The Cloud Changes Everything
PPTX
Cloud Computing Tools
PDF
Software Defined Data Centers - June 2012
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PPTX
PPTX
Improvements in Failover Clustering in Windows Server 2012
PPTX
Windows server 2012 failover clustering improvements
PPTX
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
PDF
Introduction - Trend Micro Deep Security
PPT
Intro to CloudStack Build a Cloud Day
DOC
Serverless Thin Client
PDF
CCA09 Cloud Computing Standards and OCCI
PPT
Introduction to Cloud Computing
PDF
Embedded Hypervisor for ARM
PDF
Learn OpenStack from trystack.cn ——Folsom in practice
PDF
CloudFest Denver Windows Azure Design Patterns
Private cloud day session 5 a solution for private cloud security
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Denial of Service in Software Defined Netoworks
Cybera - Clouds & other computational frameworks for science
BayThreat Why The Cloud Changes Everything
Cloud Computing Tools
Software Defined Data Centers - June 2012
Virtual sharp cloud aware bc dr up 2012 cloud
Improvements in Failover Clustering in Windows Server 2012
Windows server 2012 failover clustering improvements
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Introduction - Trend Micro Deep Security
Intro to CloudStack Build a Cloud Day
Serverless Thin Client
CCA09 Cloud Computing Standards and OCCI
Introduction to Cloud Computing
Embedded Hypervisor for ARM
Learn OpenStack from trystack.cn ——Folsom in practice
CloudFest Denver Windows Azure Design Patterns

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars

Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

  • 1. Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments Nicolae Paladi1*, Christian Gehrmann1, Mudassar Aslam1, Fredric Morenius2 1 Swedish Institute of Computer Science 2 Ericsson Research
  • 2. 2 Contents 1. Infrastructure-as-a-Service 2. Problem Setting 3. Attacker Model 4. Related Work 5. Protocol Description 6. Protocol Implementation 7. Conclusion - u re ct ru - st a fra as- vice In r Se
  • 3. 3 Infrastructure-as-a-Service • A 'cloud computing' service model (NIST:2011):  Provision processing, storage, networks.  Deploy and run arbitrary software  No control over underlying cloud infrastructure  Control over OS, storage, deployed applications.  Limited control of select networking components. rio e na d s Sc an tion i in def
  • 4. 4 Scenario and Definitions Scheduler (S) Compute Compute Compute Host Host Host (CH) (CH) (CH) Hardware Hardware Hardware Client (C) f rie te B o M N TP on
  • 5. 5 A Brief Note on TPM • Trusted platform module v1.2 as specified by TCG • v2.0 is currently under review • Tamper-evident • 16+ PCRs as volatile or non-volatile storage Four operations: Signing / Binding / Sealing / Sealed-sign em o bl ng Pr etti S
  • 6. 6 Problem Setting • “Consumer is able to deploy and run arbitrary software, which can include operating systems and applications.” • Client can launch VMs for sensitive computations. • Trusted VM launch – the correct VM is launched in a IaaS platform on a host with a known software stack verified to not have been modified by malicious actors. • How do we ensure a trusted VM launch in an untrusted IaaS environment? er ta c k el At od M
  • 7. 7 Attacker Model • (Ar) has root access to IaaS hosts. • (Ar) has no physical access. • (Ar) has no access to CH's memory. • (Ar) can act maliciously or in good faith. ck tta ario A n e Sc 1 • (A ) can be a person/malicious software/code bug.
  • 8. 8 Attack scenario 1 Remote Attacker Scheduler Ar (S) Trusted Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ck tta ario A n e Sc 2
  • 9. 9 Attack scenario 2 Remote Attacker Ar Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ed lat rk Re o W
  • 10. 10 Related Work d u ste d Tr hir ty T ar P
  • 11. 11 Trusted VM Launch Protocol: Trusted Third Party • Trusted Third Party (TTP) – trusted by C and IaaS, able to assess the SP of CH according to predefined guidelines. • Security profile (SP) – verified setup of an VM, trusted by the Participants. • Currently no fine-grained scale of SP available. • Limited to only matching the measurements with reference values. g Bi e e r Th ictu P
  • 12. The big picture 3. (S) 1. 4. 5. 2. CH CH CH 6. HW HW HW + TPM l Client (C) c o ion to t ro crip P s 1) e ( D
  • 13. 13 Trusted VM Launch Protocol: Protocol Details (1) l c o ion to t ro crip P s 2) e ( D
  • 14. 14 Trusted VM Launch Protocol: Protocol Details (2) l co ion to t ro rip P sc 3) e ( D
  • 15. 15 Trusted VM Launch Protocol: Protocol Details (3) l c o ion to t ro crip P s 4) e ( D
  • 16. 16 Trusted VM Launch Protocol: Protocol Details (4) k S tac n pe O
  • 17. 18 Trusted VM Launch Protocol: OpenStack • Protocol was implemented in OpenStack • Open Source IaaS deployment and management platform. • Large user base and multiple industry contributors • “Essex” release as baseline. • Aimed to have a minimal footprint in terms of code modifications. • Implementation changed 4 components involved in the launch process (presented next). l n co atio to t r o en P m ) e pl (1 Im
  • 18. 19 Trusted VM Launch Protocol: Protocol Implementation (1) Affected components: • Nova SQL db – global security profile per compute host. • Dashboard – request compute host attestation, minimum SP, TTP’s URL and Token upload. • Scheduler – SimpleScheduler to schedule VM launches on trusted CH with the requested–or stricter–SP. • Nova compute – support communication with TPM through TSS, encryption/decryption and VM image integrity assessment. l n co tatio to ro en P e m 2) pl ( Im
  • 19. 20 Trusted VM Launch Protocol: Protocol Implementation (2) • TrustedComputingPools (currently in blueprints) will introduce TPM support in OpenStack • Trusted IaaS provider with untrusted nodes. • Node attestation offered as “premium service”. • Node attestation performed by IaaS provider itself. n u si o n cl Co
  • 20. 21 Conclusion • A trusted VM launch protocol available assuming an untrusted IaaS platform + TPM + physical security of the hosts. • Fairly close to ongoing industrial implementation but offers stricter security guarantees. • Fine-grained attestation process on the TTP side still a research challenge.