[prev in list] [next in list] [prev in thread] [next in thread]
List: dmca-discuss
Subject: [DMCA_Discuss] All About Palladium (as if you didnt know already)
From: iriXx <iriXx () irixx ! org>
Date: 2003-09-19 0:28:06
[Download RAW message or body]
[beware of the crossposts]
another one of M$'s nice bits of marketing on why you should build
palladium. or NGSCIREFIUHS(FH or whatever they call it now.
i get one of these quite regularly and its an interesting means of
snooping on whassup. seems to be an awful lot of glossy marketing going
into a rather incomprehensible name.... Palladium at least had more
'spin' ;-)
m~
-------- Original Message --------
Subject: Next-Generation Secure Computing Base Information Newsletter,
September 2003
Date: Fri, 19 Sep 2003 01:22:36 +0100 (BST)
From: Windows Trusted Platform and Infrastructure Team
To: iriXx
Welcome to the September 2003 edition of the Next-Generation Secure
Computing Base Information Newsletter.
Overview: A Trusted Open Platform
By Paul England, Software Architect, Security Business Unit, Microsoft
Corporation
In the July 2003 issue of IEEE Computer magazine, several of my
colleagues and I describe the design goals and architectural approach we
are taking in the development of the Next-Generation Secure Computing
Base (NGSCB). The article, entitled, “A Trusted Open Platform,” offers a
good explanation of why we’re building NGSCB and what it entails. Given
the great interest around NGSCB, we felt it would be useful to summarize
the article for this month’s newsletter. We urge you to read the article
in its entirety, either by obtaining a copy of IEEE Computer magazine or
downloading a softcopy version from our Web site at
http://www.microsoft.com/ngscb.
Why Build NGSCB?
Every day, computers are entrusted with more personal and valuable data.
As a result, users are pressed to find effective ways to safeguard data
from theft or misuse. Access-control mechanisms provide some relief, but
because the integrity of the operating system kernel cannot be ensured,
the effectiveness of access-control mechanisms is limited in a
mass-market setting. Additionally, the commercial need for a powerful,
expandable, and flexible computing architecture has resulted in
operating systems containing device drivers for a large collection of
peripheral devices and millions of lines of code. A single error or
intentional alteration in this code base can provide the opening for an
attack. Moreover, loose system administration, a widespread issue in
both home and organizational settings, can exacerbate these problems,
which together expose open-system users to serious risks.
Closed systems such as set-top boxes or game machines provide one
solution by enabling stricter control over platform hardware and
software, making it difficult or impossible to change the operating
system or to run an unknown or unauthorized application, and thus easier
to ensure data and transaction integrity. However, the loss of
flexibility makes it unlikely that such systems could replace the PC.
Microsoft’s Next-Generation Secure Computing Base aims to provide robust
access control while retaining the openness of personal computers.
Unlike closed systems, an NGSCB platform can run any software (legacy
Windows applications will still run), but it extends the PC architecture
to provide new mechanisms that allow operating systems and applications
to protect themselves against other software running on the same machine.
The NGSCB system design was guided by both commercial requirements and
security goals. The main commercial requirement was the need for an open
architecture that allows arbitrary hardware peripherals to be added to
the platform, and arbitrary software to execute without involving a
central authority. Our central security goal was assurance, meaning the
degree of confidence the owner of a system can have in its correct
behavior -- especially in the presence of attacks.
NGSCB System Overview
NGSCB implements authenticated operation in the context of a complete
system that includes the following:
- Machine partitioning, which lets two or more operating systems run
side-by-side on the same hardware while separated by a machine monitor;
- Trusted paths for secure user input and output, and
- Initialization: a lightweight boot of a machine monitor from within an
already running operating system.
These and additional concepts relating to NGSCB are explored in greater
depth in the IEEE Computing magazine article, as well as on the NGSCB
Web site, located at www.microsoft.com/ngscb.
As we noted in the article, many of the aspects that characterize
today’s open systems are simply at odds with the fundamental tenets of
secure system design. In response, NGSCB aims to provide security and
openness while meeting the demands of commercially successful
mass-market operating systems.
At Microsoft, we are working with a broad coalition of hardware partners
to enable NGSCB. Core hardware components -- such as CPUs, chipsets,
trusted platform monitors, and video and input support -- are being
developed. Microsoft’s Trusted Platforms team is developing the
corresponding software components.
If you would like to find out more about NGSCB, I hope you will refer to
the full article and also explore the various events and resources
mentioned below.
Sincerely,
Paul England
Upcoming Events
--------------------------------------------------------------
SecureWorld Expo, September 24-25, 2003, Seattle, WA
http://www.secureworldexpo.com/
Informatik 2003, September 29- October 2, Frankfurt, Germany
http://www.informatik2003.de/
John Manferdelli, general manager of Windows Security, and Dave
Aucsmith, chief technology officer of Microsoft’s Security Business
Unit, will speak on NGSCB and general security at Microsoft.
Microsoft Momentum, October 9-11, New Orleans, LA
http://www.microsoft.com/partner/events/fusion
Professional Developer Conference (PDC), October 26-30, 2003, Los
Angeles, CA
http://msdn.microsoft.com/events/pdc/
PDC 2003 will feature more tracks and sessions than ever before,
including a session on NGSCB application integration and an NGSCB demo.
The security symposium on day four, “Putting Security Theory into
Practice: Writing Secure Code,” offers the opportunity to hear from
engineers, developers and architects in the security "trenches" at
Microsoft as they discuss the knowledge gained, best practices, and
lessons learned from the last two years of security focus.
Digital ID World, October 15-17, 2003, Denver, CO
http://conference.digitalidworld.com/2003/index.php
Microsoft will take part in several panels at Digital ID World, covering
identity management, rights management, and the Next-Generation Secure
Computing Base. Brian Arbogast, corporate vice president, Microsoft
Corporation, will also present. Microsoft will also exhibit with a
number of its identity management partners.
RSA Europe, November 3-5, 2003, Amsterdam, The Netherlands
http://www.rsaconference.com/conf2003_portal.html
Mike Nash, corporate vice president of Microsoft’s Security Business
Unit, will keynote. Brian LaMacchia, cryptographic architect, Microsoft
Corporation, will present on NGSCB.
Relevant Info
-----------------------------------------------------------------------
Visit the NGSCB Web site:
http://www.microsoft.com/ngscb
Get additional information about Trustworthy Computing:
http://www.microsoft.com/mscorp/innovation/twc/
Learn more about Microsoft products and security:
http://www.microsoft.com/security
Find further information about Microsoft products and privacy:
http://www.microsoft.com/privacy
-----------------------------------------------------------------------
Please forward this newsletter to interested friends and colleagues.
Anyone can sign up directly by sending a blank e-mail to:
wtpiinfo-subscribe@pens.tm500.com
To cancel your subscription, please e-mail
wtpiinfo-unsubscribe@pens.tm500.com.
THIS DOCUMENT AND OTHER DOCUMENTS PROVIDED PURSUANT TO THIS PROGRAM ARE
FOR INFORMATIONAL PURPOSES ONLY. The information type should not be
interpreted to be a commitment on the part of Microsoft and Microsoft
cannot guarantee the accuracy of any information presented after the
date of publication. INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED
'AS IS' WITHOUT WARRANTY OF ANY KIND. The user assumes the entire risk
as to the accuracy and the use of this document.
Microsoft.com newsletter e-mail may be copied and distributed subject to
the following conditions:
1. All text must be copied without modification and all pages must be
included
2. All copies must contain Microsoft's copyright notice and any other
notices provided therein
3. This document may not be distributed for profit
©2003 Microsoft Corporation. All rights reserved.
Terms of Use | http://www.microsoft.com/info/cpyright.htm
Privacy Statement | http://www.microsoft.com/info/privacy.htm
Accessibility | http://www.microsoft.com/enable/
--
|\ _,,,---,,_
ZZZzz /,`.-'`' -. ;-;;,_ HTTP 503: Too Busy
|,4- ) )-,_. ,\ ( `'-'
'---''(_/--' `-'\_) fL
"Do not meddle in the affairs of cats, for they are
subtle and will piss on your computer."
-- Bruce Graham
Musicians say No to RIAA Persecution and Prosecution of Music Lovers!
Sign the petition at http://www.copyleftmedia.org.uk/justsayno/
.::. www.iriXx.org .::. www.copyleftmedia.org.uk .::.
_______________________________________________
------------------------
http://www.anti-dmca.org
------------------------
DMCA_Discuss mailing list
DMCA_Discuss@lists.microshaft.org
http://lists.microshaft.org/mailman/listinfo/dmca_discuss
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic