[prev in list] [next in list] [prev in thread] [next in thread] 

List:       dmca-discuss
Subject:    [DMCA_Discuss] All About Palladium (as if you didnt know already)
From:       iriXx <iriXx () irixx ! org>
Date:       2003-09-19 0:28:06
[Download RAW message or body]

[beware of the crossposts]

another one of M$'s nice bits of marketing on why you should build 
palladium. or NGSCIREFIUHS(FH or whatever they call it now.

i get one of these quite regularly and its an interesting means of 
snooping on whassup. seems to be an awful lot of glossy marketing going 
into a rather incomprehensible name.... Palladium at least had more 
'spin' ;-)

m~

-------- Original Message --------
Subject: Next-Generation Secure Computing Base Information Newsletter, 
September 2003
Date: Fri, 19 Sep 2003 01:22:36 +0100 (BST)
From: Windows Trusted Platform and Infrastructure Team
To: iriXx

Welcome to the September 2003 edition of the Next-Generation Secure 
Computing Base Information Newsletter.

Overview: A Trusted Open Platform
By Paul England, Software Architect, Security Business Unit, Microsoft 
Corporation

In the July 2003 issue of IEEE Computer magazine, several of my 
colleagues and I describe the design goals and architectural approach we 
are taking in the development of the Next-Generation Secure Computing 
Base (NGSCB). The article, entitled, “A Trusted Open Platform,” offers a 
good explanation of why we’re building NGSCB and what it entails. Given 
the great interest around NGSCB, we felt it would be useful to summarize 
the article for this month’s newsletter. We urge you to read the article 
in its entirety, either by obtaining a copy of IEEE Computer magazine or 
downloading a softcopy version from our Web site at 
http://www.microsoft.com/ngscb.

Why Build NGSCB?

Every day, computers are entrusted with more personal and valuable data. 
As a result, users are pressed to find effective ways to safeguard data 
from theft or misuse. Access-control mechanisms provide some relief, but 
because the integrity of the operating system kernel cannot be ensured, 
the effectiveness of access-control mechanisms is limited in a 
mass-market setting. Additionally, the commercial need for a powerful, 
expandable, and flexible computing architecture has resulted in 
operating systems containing device drivers for a large collection of 
peripheral devices and millions of lines of code. A single error or 
intentional alteration in this code base can provide the opening for an 
attack. Moreover, loose system administration, a widespread issue in 
both home and organizational settings, can exacerbate these problems, 
which together expose open-system users to serious risks.

Closed systems such as set-top boxes or game machines provide one 
solution by enabling stricter control over platform hardware and 
software, making it difficult or impossible to change the operating 
system or to run an unknown or unauthorized application, and thus easier 
to ensure data and transaction integrity. However, the loss of 
flexibility makes it unlikely that such systems could replace the PC.

Microsoft’s Next-Generation Secure Computing Base aims to provide robust 
access control while retaining the openness of personal computers. 
Unlike closed systems, an NGSCB platform can run any software (legacy 
Windows applications will still run), but it extends the PC architecture 
to provide new mechanisms that allow operating systems and applications 
to protect themselves against other software running on the same machine.

The NGSCB system design was guided by both commercial requirements and 
security goals. The main commercial requirement was the need for an open 
architecture that allows arbitrary hardware peripherals to be added to 
the platform, and arbitrary software to execute without involving a 
central authority. Our central security goal was assurance, meaning the 
degree of confidence the owner of a system can have in its correct 
behavior -- especially in the presence of attacks.

NGSCB System Overview

NGSCB implements authenticated operation in the context of a complete 
system that includes the following:

- Machine partitioning, which lets two or more operating systems run 
side-by-side on the same hardware while separated by a machine monitor;
- Trusted paths for secure user input and output, and
- Initialization: a lightweight boot of a machine monitor from within an 
already running operating system.

These and additional concepts relating to NGSCB are explored in greater 
depth in the IEEE Computing magazine article, as well as on the NGSCB 
Web site, located at www.microsoft.com/ngscb.

As we noted in the article, many of the aspects that characterize 
today’s open systems are simply at odds with the fundamental tenets of 
secure system design. In response, NGSCB aims to provide security and 
openness while meeting the demands of commercially successful 
mass-market operating systems.

At Microsoft, we are working with a broad coalition of hardware partners 
to enable NGSCB. Core hardware components -- such as CPUs, chipsets, 
trusted platform monitors, and video and input support -- are being 
developed. Microsoft’s Trusted Platforms team is developing the 
corresponding software components.

If you would like to find out more about NGSCB, I hope you will refer to 
the full article and also explore the various events and resources 
mentioned below.

Sincerely,
Paul England

Upcoming Events
--------------------------------------------------------------
SecureWorld Expo, September 24-25, 2003, Seattle, WA
http://www.secureworldexpo.com/

Informatik 2003, September 29- October 2, Frankfurt, Germany
http://www.informatik2003.de/
John Manferdelli, general manager of Windows Security, and Dave 
Aucsmith, chief technology officer of Microsoft’s Security Business 
Unit, will speak on NGSCB and general security at Microsoft.

Microsoft Momentum, October 9-11, New Orleans, LA
http://www.microsoft.com/partner/events/fusion

Professional Developer Conference (PDC), October 26-30, 2003, Los 
Angeles, CA
http://msdn.microsoft.com/events/pdc/
PDC 2003 will feature more tracks and sessions than ever before, 
including a session on NGSCB application integration and an NGSCB demo. 
The security symposium on day four, “Putting Security Theory into 
Practice: Writing Secure Code,” offers the opportunity to hear from 
engineers, developers and architects in the security "trenches" at 
Microsoft as they discuss the knowledge gained, best practices, and 
lessons learned from the last two years of security focus.

Digital ID World, October 15-17, 2003, Denver, CO
http://conference.digitalidworld.com/2003/index.php
Microsoft will take part in several panels at Digital ID World, covering 
identity management, rights management, and the Next-Generation Secure 
Computing Base. Brian Arbogast, corporate vice president, Microsoft 
Corporation, will also present. Microsoft will also exhibit with a 
number of its identity management partners.

RSA Europe, November 3-5, 2003, Amsterdam, The Netherlands
http://www.rsaconference.com/conf2003_portal.html
Mike Nash, corporate vice president of Microsoft’s Security Business 
Unit, will keynote. Brian LaMacchia, cryptographic architect, Microsoft 
Corporation, will present on NGSCB.

Relevant Info
-----------------------------------------------------------------------
Visit the NGSCB Web site:
http://www.microsoft.com/ngscb
	
Get additional information about Trustworthy Computing:
http://www.microsoft.com/mscorp/innovation/twc/

Learn more about Microsoft products and security:
http://www.microsoft.com/security

Find further information about Microsoft products and privacy:
http://www.microsoft.com/privacy

-----------------------------------------------------------------------
Please forward this newsletter to interested friends and colleagues. 
Anyone can sign up directly by sending a blank e-mail to:
wtpiinfo-subscribe@pens.tm500.com

To cancel your subscription, please e-mail 
wtpiinfo-unsubscribe@pens.tm500.com.

THIS DOCUMENT AND OTHER DOCUMENTS PROVIDED PURSUANT TO THIS PROGRAM ARE 
FOR INFORMATIONAL PURPOSES ONLY. The information type should not be 
interpreted to be a commitment on the part of Microsoft and Microsoft 
cannot guarantee the accuracy of any information presented after the 
date of publication. INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 
'AS IS' WITHOUT WARRANTY OF ANY KIND. The user assumes the entire risk 
as to the accuracy and the use of this document.

Microsoft.com newsletter e-mail may be copied and distributed subject to 
the following conditions:

1. All text must be copied without modification and all pages must be 
included
2. All copies must contain Microsoft's copyright notice and any other 
notices provided therein
3. This document may not be distributed for profit


©2003 Microsoft Corporation. All rights reserved.

Terms of Use | http://www.microsoft.com/info/cpyright.htm

Privacy Statement | http://www.microsoft.com/info/privacy.htm

Accessibility | http://www.microsoft.com/enable/




-- 

        |\      _,,,---,,_
  ZZZzz /,`.-'`'    -.  ;-;;,_     HTTP 503: Too Busy
       |,4-  ) )-,_. ,\ (  `'-'
     '---''(_/--'  `-'\_) fL


"Do not meddle in the affairs of cats, for they are
subtle and will piss on your computer."
-- Bruce Graham


Musicians say No to RIAA Persecution and Prosecution of Music Lovers!

Sign the petition at http://www.copyleftmedia.org.uk/justsayno/


  .::. www.iriXx.org .::. www.copyleftmedia.org.uk .::.


_______________________________________________


------------------------
http://www.anti-dmca.org
------------------------

DMCA_Discuss mailing list
DMCA_Discuss@lists.microshaft.org
http://lists.microshaft.org/mailman/listinfo/dmca_discuss
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic