Joanna Rutkowska Explained

Joanna Rutkowska
Birth Date:1981
Birth Place:Warsaw
Nationality:Polish
Education:Warsaw University of Technology; Master's Degree in Computer Science
Occupation:Security researcher; CEO/Founder of Invisible Things Labs
Employer:Invisible Things Labs
Known For:Blue Pill, Evil Maid attack, Qubes OS

Joanna Rutkowska (born 1981 in Warsaw) is a Polish computer security researcher, primarily known for her research on low-level security and stealth malware,[1] and as founder of the Qubes OS security-focused desktop operating system.[2]

Career

She became known in the security community after the Black Hat Briefings conference in Las Vegas in August 2006, where Rutkowska presented an attack against Vista kernel protection mechanism, and also a technique dubbed Blue Pill, that used hardware virtualization to move a running OS into a virtual machine. Subsequently, she has been named one of Five Hackers who Put a Mark on 2006 by eWeek Magazine for her research on the topic.[3] The original concept of Blue Pill was published by another researcher at IEEE Oakland in May 2006 under the name VMBR.[4]

During the following years, Rutkowska continued to focus on low-level security. In 2007 she demonstrated that certain types of hardware-based memory acquisition (e.g. FireWire based) are unreliable and can be defeated.[5] Later in 2007, together with team member Alexander Tereshkin, presented further research on virtualization malware.[6] In 2008, Rutkowska with her team focused on Xen hypervisor security.[7] In 2009, together with a team member Rafal Wojtczuk, presented an attack against Intel Trusted Execution Technology and Intel System Management Mode.[8]

In April 2007, Rutkowska founded Invisible Things Lab in Warsaw, Poland. The company focuses on OS and VMM security research and provides various consulting services. In a 2009 blog post she coined the term "evil maid attack", detailing a method for accessing encrypted data on disk by compromising the firmware via an external USB flash drive.[9]

In 2010, she and Rafal Wojtczuk began working on the Qubes OS security-oriented desktop Xen distribution, which utilizes Fedora Linux. The initial release of Qubes 1.0 was completed by September 3, 2012.[10] Its main concept is "security by compartmentalization", using domains implemented as lightweight Xen virtual machines to isolate various subsystems. Each compartment is referred to as a Qube, which operates as a separate hardware level virtual machine. The project refers to itself as "a reasonably secure operating system" and has received endorsements by numerous privacy and security experts.[11] [12] It is fairly unique in its capabilities, having a design informed by research on proven vulnerabilities in the trusted compute base (TCB), that are unaddressed in most common desktop operating systems.

She has published seminal works on systems trustability, most recently Intel x86 Considered Harmful[13] and State Considered Harmful - A Proposal for a Stateless Laptop.[14] Rutkowska has been invited as an esteemed presenter at security conferences, such as Chaos Communication Congress, Black Hat Briefings, HITB, RSA Conference, RISK, EuSecWest & Gartner IT Security Summit.

External links

Notes and References

  1. Web site: About. Invisible Things Lab. 12 June 2016. https://web.archive.org/web/20160606001742/http://invisiblethingslab.com/itl/About.html. 6 June 2016. dead.
  2. News: Porup. J. M.. Finally, a 'Reasonably-Secure' Operating System: Qubes R3. 20 November 2017. Vice: Motherboard. 5 October 2015. 'Security by Isolation,' as Qubes founder Joanna Rutkowska puts it..
  3. Web site: Five Hackers Who Left a Mark on 2006 . Naraine . Ryan. eWeek . 2 January 2007. 11 June 2016.
  4. Book: SubVirt: Implementing Malware with Virtual Machines. Samuel T.. 2006 IEEE Symposium on Security and Privacy (S&P'06). King. Peter M.. Chen. Yi-Min. Wang. Chad. Verbowski. Helen J.. Wang. Jacob R.. Lorch. 1 January 2006. IEEE Computer Society. 314–327. 10.1109/SP.2006.38. 978-0-7695-2574-7. 10.1.1.684.4485. 1349303 .
  5. Beyond The CPU: Defeating Hardware Based RAM Acquisition . Joanna . Rutkowska . 28 February 2007 . Black Hat DC . Washington, D.C..
  6. IsGameOver, anyone? . Rutkowska . Joanna . Tereshkin . Alexander . 8 February 2007 . Las Vegas, Nevada . Black Hat USA .
  7. Web site: Walker-Morgan. Dj. Xen virtualisation swallows a "Blue Pill". The H. https://web.archive.org/web/20131208034354/http://www.h-online.com/newsticker/news/item/Xen-virtualisation-swallows-a-Blue-Pill-736839.html. 8 December 2013. 12 August 2008.
  8. http://blackhat.com/presentations/bh-dc-09/Wojtczuk_Rutkowska/BlackHat-DC-09-Rutkowska-Attacking-Intel-TXT-slides.pdf Attacking Intel Trusted Execution Technology
  9. Web site: The Invisible Things Lab's blog: Evil Maid goes after TrueCrypt!. Rutkowska. Joanna. 2009-10-16. The Invisible Things Lab's blog. 2018-10-30.
  10. Web site: Introducing Qubes 1.0!. blog.invisiblethings.org. 2017-02-01.
  11. Snowden . Edward Snowden . 781493632293605376 . September 29, 2016 . If you're serious about security, @QubesOS is the best OS available today. It's what I use, and free. Nobody does VM isolation better..
  12. hashbreaker . Daniel J. Bernstein . 577206817475850240 . Mar 15, 2015 . Happy thought of the day: An attacker who merely finds a browser bug can't listen to my microphone except when I've told Qubes to enable it..
  13. Web site: Rutkowska . Joanna . Intel x86 considered harmful. The Invisible Things. 12 June 2016. October 2015.
  14. Web site: Rutkowska. Joanna. State Considered Harmful - A Proposal for a Stateless Laptop. The Invisible Things. 12 June 2016. December 2015.