期刊文献+

基于可信计算的动态完整性度量架构 被引量:46

TPM-Based Dynamic Integrity Measurement Architecture
下载PDF
导出
摘要 该文提出一种基于可信计算的操作系统动态度量架构(DIMA),帮助管理员动态地检查系统中进程和模块的完整性。相对于以往的各种操作系统度量架构,该架构能按需对系统中活动的进程或模块进行动态实时的完整性度量与监控,基本解决了其他架构难以避免的TOC-TOU问题,特别是针对某些直接对运行中的进程的攻击有很好的效果。另外,DIMA实现了对对象细粒度度量——由度量整个文件实体细分为度量代码、参数、堆栈等等。最后给出了基于Linux操作系统的动态度量原型实现,在实现中使用了基于可信平台模块(TPM)作为架构的信任源点,测试结果表明DIMA能够实现预定目标且有良好的性能。 This paper presents a TPM-based architecture DIMA (Dynamic Integrity Measurement Architecture),which helps the administrators check the integrity of the processes and modules dynamically. Compares with other measurement architectures,DIMA uses a new mechanism to provide dynamic measurement of the running processes and kernel modules. Some attacks to running processes which use to be invisible to other integrity measurement architectures can be now detected. In this case,DIMA solves the TOC-TOU problem which always bothers others before. In addition,instead of measuring the whole file on the hard disk,the object is divided into some small pieces:code,parameter,stack and so on to make a fine-grained measurement result. Finally,the DIMA implementation using Trust Computing Module (TPM) is discussed and the performance data is presented.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第4期875-879,共5页 Journal of Electronics & Information Technology
基金 国家863计划项目(2007AA01Z412) 国家科技支撑计划项目(2008BAH22B06)资助课题
关键词 可信计算模块 完整性度量 动态完整性度量架构(DIMA) Trusted Computing Module (TPM) Integrity measurement Dynamic Integrity Measurement Architecture (DIMA)
  • 相关文献

参考文献11

  • 1Trusted Computing Group. TCG PC client specific implementation specification for conventional bios version 1.2, July 2005.
  • 2Apvrille A, Gordon D, Hallyn S, Pourzandi M, and Roy V. DigSig: Run-time authentication of binaries at kernel Level[C]. Proceedings of LISA '04 Eighteenth Systems Administration Conference. Atlanta, GA, USENIX Association November, 2004: 59-66.
  • 3Petroni N Jr and Fraser T, et al.. Copilot - A coprocessor -based kernel runtime integrity monitor[C]. Proceedings of the 13th conference on USENIX Security Symposium. San Diego, CA, 2004, Vol. 13: 13-13.
  • 4Sailer R, Zhang Xiao-lan, Jaeger T, and Van Doorn L. Design and implementation of a TCG-based integrity : architecture[C]. Proceedings of USENIX Security Symposium. Lake Tahoe, California, USA, ACM Press, Aug. 2004: 223-238.
  • 5Jaeger T, Sailer R, and Shankar U. PRIMA: Policy-reduced integrity t architecture[C]. Proceedings of the eleventh ACM symposium on Access control models and technologies. Lake Tahoe, California, USA, 2006: 19-28.
  • 6Shi E, Perrig A, and Van Doorn L. BIND: A fine-grained attestation service for secure distributed systems[C]. Proceeding of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, IEEE Press, 2005: 154-168.
  • 7Loscocco P A, Wilson P W, Pendergrass J A, and McDonell C D. Linux kernel integrity measurement using contextual inspection[C]. Proceedings of the 2007 ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2007 21-29.
  • 8Thober M and Pendergrass J A. McDonell C D: Improving coherency of runtime integrity measurement[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 51-60.
  • 9Gu Liang, Ding Xu-hua, Deng R H, Xie Bing, and Mei Hong. Remote attestation on program execution[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 11-20.
  • 10Wu Yong-dong, Zhao Zhi-gang, and Chui Tian-wei. An attack on SMC-based software protection[M]. Springer Berlin / Heidelberg. 2007: 232-248.

二级参考文献5

  • 1Marchesini J, Smith SW, Wild O, et al. Open-source applications of TCPA hardware. In: 20th Annual Computer Seeurity Applications Conference (ACSAC'04). 2004. 294 - 303
  • 2Arbaugh WA, Farber D J, Smith JM. A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. 1997. 65- 71
  • 3Applied Data Security Group. What is trustedGRUB. [ 2007-05-061 http://www. prosec.ruhr-uni-bochum. de/trustedgrub. html
  • 4IBM, TrouSerS An open-source TCG software stack implernentation. [ 2007-04-03 ] http ://sourceforge. net/projects/trousers
  • 5Bernhard Kauer. Authenticated booting for L4. 2004. [ 2006-07-12] http://os. inf. tu-dresden. de/papers_ ps/kauer-beleg.pdf

共引文献9

同被引文献315

引证文献46

二级引证文献368

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部