Bart Miller October 22 nd 2012 Xoar Outline
Bart Miller – October 22 nd, 2012 Xoar
Outline �TCB & Threat Model �Xen Platform �Xoar Architecture Overview �Xoar Components �Design Goals �Results Security Vulnerability Mitigation Performance
TCB �Trusted Computing Base is defined as “the totality of protection mechanisms within a computer system – including hardware, firmware, and software – the combination of which is responsible for enforcing a security policy. ” �Xen, by virtue of privilege, is part of the TCB
TCB �In Xen, all components operate under a monolithic trust domain �Compromise of any component yields two benefits: Gain privilege level of component Access its interfaces to other components
TCB
Threat Model �Assumption #1: Administrators are not a concern Business imperative �Assumption #2: Malicious guest VM Violate data integrity or confidentiality Exploiting code �Assumption #3: The control VM will contain bugs
Xen Platform – A brief revisit �Device drivers Virtualized, passed-through, or emulated �Xen. Store Hierarchical key-value store System-wide registry Most critical component ▪ Vulnerable to Do. S attacks ▪ Perform most administrative operations
Xen Platform �Toolstack Administrative functions Create, destroy, managing resources and privilege for guest VMs �System Boot Starts Dom. O process, initialize hardware
Xoar Architecture Overview
Xoar Components
Design Goals �Reduce privilege Each component should only have the privileges essential to its purpose Each component should only expose interfaces when necessary
Design Goals �Reduce sharing Sharing components should be avoided wherever it is reasonable Any sharing of components must be explicit Allows for logging and auditing in the event of a compromise
Design Goals
Design Goals
Design Goals �Reduce staleness A component should only run for as long as it needs to perform its task. It should be restored to a known, good state as frequently as practicable.
Results - Security �Reduced TCB Bootstrapper, PCIBack, and Builder are most privileged components Bootstrapper and PCIBack destroyed once initialized TCB reduced ▪ Linux: 7. 6 M Lo. C ▪ Builder: 13, 5 k Lo. C (Builder)
Results – Vulnerability Mitigation �Solved through isolation Device Emulation Virtualized Drivers �Xen. Store, re-written �Hypervisor vulnerabilities remain
Results - Performance �Test system Ca. 2011 server Quad-core Xeon, 4 Gb RAM All virtualization features enabled �Memory overhead 512 Mb – 896 Mb in Xoar vs. 750 Mb in Xen. Server
Theoretical Benchmarks
“Real-world” Benchmarks
Questions �Any questions?
- Slides: 21