期刊文献+

基于虚拟机的OpenSSH秘钥数据隔离方法 被引量:1

Private data isolation for OpenSSH based on virtual machines
下载PDF
导出
摘要 OpenSSH密钥数据保存在文件系统中,在主机遭受攻击后容易暴露,需要对这些重要数据进行保护。为此提出使用虚拟机将密钥数据保存到隔离空间,并提供安全访问方法。这种方式使得即使主机在被攻陷的时候,攻击人员仍然无法获得相应的秘钥信息。使用虚拟机的方式提供了一个完全隔离的安全空间,对OpenSSH秘钥数据起到了保护作用。 OpenSSH stores keys in the file system. The keys are easy to be exposed while the host has been invaded by illegal users. Methods are needed to protect these important data. For such purpose, virtual machine protection was proposed to provide a separate space for storing the important data as well as secure accessing interfaces. By using virtual machine even under the situation that the host is compromised, the important data can still be kept safe. Thus, the safe and separate space provided by virtual machine can protect the keys of OpenSSH securely.
出处 《通信学报》 EI CSCD 北大核心 2009年第2期1-5,共5页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB310900) 国家高技术研究发展计划("863"计划)基金资助项目(2008AA01Z112) 国家自然科学基金资助项目(90718040 60603071)~~
关键词 虚拟机 密钥 数据隔离 virtual machine private key data isolation
  • 相关文献

参考文献10

  • 1OpenSSH: open source implementation of SSH[EB/OL]. http://www. openssh.org/.
  • 2YLONEN T, LONVICK C. SSH Authentication Protocol[S]. IETF Internet Draft, 2005.
  • 3SCHNEIER B. Applied Cryptography: Protocols, Algorithms and Source Code in C[M]. Second Edition, Wiley, Hoboken, NJ, 1996.
  • 4EGELE M, KRUEGEL C, KIRDA N, et al. Dynamic spyware analysis[A]. Proceedings of 2007 USENIX Annual Technical Conference[C]. Santa Clara, CA, 2007. 17-22.
  • 5BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the art of virtualization[A]. SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles[C]. New York, NY, USA, 2003. 164-177.
  • 6OVERTON M. Rootkits-risks, issues and prevention[A]. The 2006 Virus Bulletin Conference[C]. Montreal, Canada, 2006.
  • 7JIANG X, XU D. Collapsar: a VM-based architecture for network attack detention center[A]. Proceedings of the USENIX Security Symposium[C]. San Diego, CA, 2004.
  • 8JOSHI A, KING S T, DUNLAP G W, et al. Detecting past and present intrusions through vulnerability-specific predicates[A]. Proceedings of the 2005 Symposium on Operating Systems Principles (SOSP)[C]. 2005.
  • 9KING S T, CHEN P M, WANG Y M, et al. SubVirt: implementing malware with virtual machines[A]. Proceedings of the 2006 IEEE Symposium on Security and Privacy[C]. 2006.
  • 10GARFI KEL T, PFAFF B, CHOW J, et al. Terra: a virtual machine-based platform for trusted computing[A]. 19th ACM Symposium on Operating Systems Principles (SOSP 2003)[C]. 2003.

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部