期刊文献+

基于系统行为的计算平台可信证明 被引量:35

System Behavior Based Trustworthiness Attestation for Computing Platform
下载PDF
导出
摘要 计算平台可信证明是可信计算研究的热点问题.但是目前一些计算平台可信证明方案存在隐私保护和可行性等方面的缺陷.基于系统行为的计算平台可信证明模型(BTAM)在可信计算环境下,根据可信行为期望策略,将平台状态证明转化为对平台历史行为序列的可信证明,有效地避免了在准确描述计算平台状态方面的难题,保证了模型实现的可行性和可扩展性,并且不会暴露证明平台的配置信息.BTAM的原型实现和实验性能分析证明了它在防范诸如计算机病毒、木马类恶意软件攻击以及避免安全策略冲突行为等方面的安全能力,以及良好的实际安全运行效率. Remote attestation for trustworthiness of computing platform is a focus research work in Trusted Computing, but there exist some problems in some of today' s attestation approaches. System Behavior based Trustworthiness Attestation Model (BTAM) is a trustworthiness attestation model based on system behavior of attesting computing platform in trusted computing environment. BTAM determines the trustworthiness of attesting platform by its behavior sequences against the platform behavior expectation policy,therefore it avoids the difficulties in describing the state of attesting platform,assures the feasibility and scalability in the model implementation. The prototype implementation of BTAM proves the capability of BTAM in defending malicious code such as Trojan and virus and eliminating security policy conflicted activities,and the run-time performance analysis also shows the high efficiency of BTAM in security.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第7期1234-1239,共6页 Acta Electronica Sinica
基金 国家973重点基础研究发展规划(No.G1999035801)
关键词 可信计算 系统行为 可信证明 恶意软件 trusted computing system behavior trustworthiness attestation malicious code
  • 相关文献

参考文献15

  • 1Roger L Kay.How to Implement Trusted Computing,A Guide to Tighter Enterprise Security[OL].https://www.trustedcomputinggroup.org/news/Industry-Data/Implementing-Trusted-Computing-RK.pdf.
  • 2Microsoft.Next-generation secure Application base[OL].http://www.microsoft.com/resources/ngscb.
  • 3R Sailer,X Zhang,T Jaeger,L van Doorn.Design and implementation of a TCG-based integrity measurement architecture[A].In Proceedings of USENIX Security Symposium[C].Lake Tahoe,California,USA:ACM Press,Aug.2004.223-238.
  • 4A Seshadri,A Perrig,L van Doorn,P Khosla.SWAtt:SoftWare-based Attestation for embedded devices[A].In Proceedings of IEEE Symposium on Security and Privacy[C].Oakland,CA,USA:IEEE Press,May 2004.272-282.
  • 5V Haldar,D Chandra,M Franz.Semantic remote attestation-a virtual machine directed approach to trusted computing[A].In Proc.of the Third virtual Machine Research and Technology Symposium[C].San Jose,CA,USA:USENIX,2004.29-41.
  • 6E Shi,A Perrig,L van Doorn.Bind:A fine-grained attestation service for secure distributed systems[A].In Proc of the IEEE Symposium on Security and Privacy[C].Oakland,CA,USA:IEEE Press,2005.154-168.
  • 7Ahmad-Reza Sadeghi,Christian Stüble.Property-based Attestation for Computing Platforms:Caring about properties,not mechanisms[A].In Proceedings of the 2004 Workshop on New Security Paradigms[C].Nova Scotia,Canada:ACM Press,2004.66-77.
  • 8J Poritz,M Schunter,E V Herreweghen,M Waidner.Property attestation-scalable and privacy-friendly security assessment of peer computers,IBM Research Report RZ 3548,2004[OL].http://domino.watson.ibm.com/library/cyberdig.nsf/papers/215E33CB2B4F7FA485256E97002A0D6C/$File/rz3548.pdf.
  • 9TCG.TCG Specification Architecture Overview,Version1.2[S].https://www.trustedApplicationgroup.org.
  • 10William A Arbaugh,David J Farber,Jonathan M.Smith:A secure and reliable bootstrap architecture[A].in:Proceedings of the 1997 IEEE Symposium on Security and Privacy[C].New York:IEEE Press,May 1997.65-71.

共引文献33

同被引文献379

引证文献35

二级引证文献247

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部