validating hardware security through firmware interfaces · 6/1/2011  · interface •authored by...

17
presented by Validating Hardware Security Through Firmware Interfaces UEFI Summerfest – July 15-19, 2013 Presented by Jeremiah Cox (Microsoft Corp.) UEFI Summerfest July 2013 www.uefi.org 1 Updated 2011-06-01

Upload: others

Post on 21-Sep-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

presented by

Validating Hardware Security Through Firmware Interfaces

UEFI Summerfest – July 15-19, 2013Presented by Jeremiah Cox (Microsoft Corp.)

UEFI Summerfest – July 2013 www.uefi.org 1

Updated 2011-06-01

Page 2: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Agenda

• Motivation

• Challenges

• Improvements

• Call to Action

• Questions

UEFI Summerfest – July 2013 www.uefi.org 2

Page 3: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

MotivationWhy am I not at lunch right now?

UEFI Summerfest – July 2013 www.uefi.org 3

Page 4: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Security Is Important

• Exposure– “Everything” is online

• Customer Expectations– Home– Enterprise

• Intellectual Property• BYOD: Bring Your Own Device

– Consumer devices need Enterprise security– Pervasive Device Encryption

• Cost of security failure?

UEFI Summerfest – July 2013 www.uefi.org 4

Page 5: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Windows Hardware Certification Requirements (WHCR)

• 8.0– System.Fundamentals.Firmware.UEFISecureBoot

– System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby

• 8.1 Preview– System.Fundamentals.Firmware.CS.UEFISecureBoot.Provisioning

• More security improvements

• Improve testability of security features

• Required on Connected Standby systems

• Recommend for all

UEFI Summerfest – July 2013 www.uefi.org 5

Page 6: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

ChallengesSecurity is NOT Easy

UEFI Summerfest – July 2013 www.uefi.org 6

Page 7: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Security Is NOT Easy

• Defenders’ Dilemma

–Attackers

• 1 weakness == Game Over

• PR: Declared “insecure”

–Defenders

• No gaps end-to-end

• 0 security bugs

UEFI Summerfest – July 2013 www.uefi.org 7

Page 8: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Security Is NOT Easy

• Key Management• Digital Signing• Access Control• Privacy• Secure Systems

– Debugging– Recovery– Remanufacturing

• …

UEFI Summerfest – July 2013 www.uefi.org 8

Page 9: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Security Is NOT Easy: One Possible Mitigation

• Security Development Lifecycle– Training

–Requirements

–Design

– Implementation

–Verification

–Release

–Response

UEFI Summerfest – July 2013 www.uefi.org 9

Page 10: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Improve TestabilityMake life easier

UEFI Summerfest – July 2013 www.uefi.org 10

Page 11: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Windows Hardware Security Test Interface

• Verify security feature enablement

–Hardware protections enabled?

• “Platform” Secure Boot

– Firmware protections enabled?

• Secure Firmware Update

• Rollback policy

–Misconfigurations mistakes

• Option ROM verification

UEFI Summerfest – July 2013 www.uefi.org 11

Page 12: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Windows Hardware Security Test Interface• Authored by domain experts

– Chipset & BIOS vendors

• Built upon Adapter Interface Protocol (M992)– Defined by Microsoft, not a UEFI Specification

• Required on Windows 8.1 Connected Standby by 2015– Requirement:

• System.Fundamentals.Firmware.CS.UEFISecureBoot.Provisioning

– Provides testing for:• System.Fundamentals.Firmware.UEFISecureBoot• System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby

UEFI Summerfest – July 2013 www.uefi.org 12

Page 13: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Windows Hardware Security Test Interface

• Cannot test everything

– Best effort, test what is testable

– PASS does NOT guarantee success, but…

– FAIL prevents high risk blunders

• Deviations from reference designs may FAIL

– Could cause delays

UEFI Summerfest – July 2013 www.uefi.org 13

Page 14: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Call to ActionWhat do I do?

UEFI Summerfest – July 2013 www.uefi.org 14

Page 15: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Call to Action

• Ask your Chipset & BIOS vendors for their HSTI implementation

• Does it pass on your system?

– No? Find and fix the problem.

– CS systems must PASS beginning 1/1/2015

• Request more security tools & tests

• Adopt the Security Development Lifecycle

UEFI Summerfest – July 2013 www.uefi.org 15

Page 16: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Links

• Windows 8.1 Hardware Certification Requirements– http://msdn.microsoft.com/en-US/library/windows/hardware/hh748188

• Hardware Security Test Interface– Not all have access

– https://connect.microsoft.com/

– Windows Pre-Release Program > Downloads

• Security Development Lifecycle– http://aka.ms/SDL

• Pervasive Device Encryption– Bing: “What's New in Windows 8.1 technet”

UEFI Summerfest – July 2013 www.uefi.org 16

Page 17: Validating Hardware Security Through Firmware Interfaces · 6/1/2011  · Interface •Authored by domain experts –Chipset & BIOS vendors •Built upon Adapter Interface Protocol

Thanks for attending the UEFI Summerfest 2013

For more information on the Unified EFI Forum and UEFI Specifications, visit http://www.uefi.org

presented by

UEFI Summerfest – July 2013 www.uefi.org 17