期刊文献+

基于嵌入微LINUX的开机安全认证系统 被引量:1

Boot Security Authentication System Based on Embedded Micro-LINUX
下载PDF
导出
摘要 提出了一种高安全性的开机安全认证方法,该认证系统在硬盘上嵌入一个微Linux系统作为认证系统的载体,并且使用USB移动介质作为KEY盘来保存硬盘启动扇区、分区表、以及登录密钥等系统启动的必要信息,只有同时拥有密钥和KEY盘的合法用户才能通过验证并登录计算机系统.这种方法实现了重要信息如密钥和启动信息等与硬盘原始数据的独立存储,而且可以应用基于微Linux系统下性能优良的MD5和DES等加密算法,从而增强了开机认证的安全性. This paper proposes a highly secure method of boot security authentication, involving one embedded micro-Linux system stored in the disk driver being the authentication carrier and one USB removable media being a KEY startup disk to save boot data and key disk. This approach implemented the independent storage of important information such as key, start-up and disk original data. Also, it can employ high-performance MD5 and DES encryption algorithms based on micro-Linux system, thus greatly increasing the security of the boot authentication and effectively protecting the disk data.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第7期181-184,189,共5页 Microelectronics & Computer
基金 西北工业大学教务处本科重点毕业设计项目
关键词 开机认证 嵌入LINUX 安全启动 计算机数据安全 boot authentication embedded micro-LINUX security start-up computer data security
  • 相关文献

参考文献4

  • 1Kcphart J O. Biologically inspired defeusos against computer viruses[C]//Proc, Int' L . Conf. n AI (IJCAI - 95). Morgan Kauf mann, San Francisco, 1995 : 985 - 996.
  • 2White S R, Kephart J O, Chess D M. Computer virusas: a global perspective [C]//Proc. Fifth Irat'l Virus Bulletin Conf. VimsBulletin Ltd. England, Abingdon, 1995 : 165 - 181.
  • 3廖金祥.硬盘引导扇替换技术及其应用[J].武汉冶金科技大学学报,1998,21(1):97-102. 被引量:1
  • 4Love R.Linux内核设计与实现[M].2版.陈莉君,译.北京:机械工业出版社,2006.

同被引文献7

  • 1Tsai T, Singh N. Libsafe 2.0: detection of format string vulnerability exploits [M]. White Paper Ver- sion 3-21-01, Avaya Labs, Avaya Inc, 2001.
  • 2Cowan C, tMrringer M, Beattie S. FormatGuard: automatic protection from printf format string vulner- abilities [C]// proceedings of the IOth USENIX Secu- rity Symposium. Washington, IX;, USA: IEEE, 2001.
  • 3Shankar U, Talwar K, Foster J S. Detecting format string vulnerabilities with type qualifiers[C]//pro- ceedings of the 1Oth USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2001.
  • 4Ringenburg F, Grossman Dan. Preventing format- string attacks via automatic and efficient dynamic checking [C] // proceedings of the 12th ACM Confer- ence on Computer and Communications Security. New York, NY, USA: ACM, 2005.
  • 5John Viega, Bloch J T, Tadayoshi Kohno. ITS4.. A static vulnerability scanner for C and C++ code [C] ////proceedings of Annual Computel Security Applica- tions Conference. New or leans, LA: IEEE, 2000.
  • 6Dzintars Avots, Michael Dalton, Benjamin Livshits. Improving software security through a C pointer anal- ysis [C]// proceedings of the 27th International Con- ference on Software Engineering. 2005.
  • 7程铃.MANET入侵检测技术的研究[J].微电子学与计算机,2010,27(6):57-59. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部