期刊文献+

TCM固件符合性测试的设计与实施

Design and Implementation of Compliance Test on TCM Firmware Protocol
原文传递
导出
摘要 可信密码模块(TCM)是中国可信计算的基础,其上的固件(Firmware)是TCM芯片的操作系统,对其进行协议符合性测试是验证TCM性能的重要方法。在分析可信密码模块及其固件结构的基础上,说明了TCM命令的数据结构及其各项参数。按照TCM命令协议文档,给出一个针对该协议的固件协议符合性测试方案。实现该方案后,对某款TCM芯片的固件进测试结果表明:该方案切实可行,效果良好。 Trusted cryptography module is the foundation of China trusted computing,and its firmware is the operating system of TCM chip,and the compliance test on firmware protocol is an important method for verifying the capability of TCM.With analysis on the structure of TCM and firmware on TCM,the data structure and parameters of TCM commands are described.In accordance with the TCM protocols,the paper presents a compliance test scheme of firmware protocol.This scheme is implemented,and the test on the firmware of TCM chips indicates that this scheme is feasible and effective in pratice.
出处 《通信技术》 2010年第7期100-102,共3页 Communications Technology
基金 北京市人才强教深化计划--中青年骨干教师项目(No.71A0911170)
关键词 可信密码模块 固件 协议符合性测试 命令接口 trusted cryptography module(TCM) firmware protocol compliance test command interface
  • 相关文献

参考文献8

  • 1国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.Gov.on/UpFile/File64.PDF,2008
  • 2Trusted Computing Group.TPM Main Specification:Design Principles V1.2[EB/OL].(2007-06-01).[2008-12-09].http://www.trustedcomputinggroup.org.
  • 3Trusted Computing Group.TCG TPM Main Specification,Version 1.2 Revision 94,Part 1,Design Principles[DB/OL].(2007-06-01).[2008-12-09].http://www.trustedcomputinggroup.org.
  • 4Trusted Computing Group.TCG TPM Main Specification,Version 1.2 Revision 94,Part 2,TPM Structures[DB/OL].(2007-06-01).[2008-12-09].http://www.trustedcomputinggroup.org.
  • 5Trusted Computing Group.TCG TPM Main Specification,Version 1.2 Revision 94,Part 3,TPM Commands[DB/OL].(2007-06-01).[2008-12-09].http://www.trustedcomputinggroup.org.
  • 6朱海卫,施蕾.浅议可信计算的发展[J].信息安全与通信保密,2009,31(3):79-81. 被引量:6
  • 7李昊,冯登国,陈小峰.可信密码模块符合性测试方法与实施[J].武汉大学学报(理学版),2009,55(1):31-34. 被引量:13
  • 8崔奇,马楠,刘贤刚.TPM接口命令标准符合性测试的设计与实现[J].计算机工程,2009,35(2):129-132. 被引量:4

二级参考文献22

  • 1亓伟,叶晓俊,王建民.ODBC标准符合性测试框架[J].计算机工程,2005,31(20):101-103. 被引量:5
  • 2沈昌祥.坚持自主创新 加速发展可信计算[J].计算机安全,2006(6):2-4. 被引量:17
  • 3易国洪,卢炎生.基于EFSM模型的等价类测试[J].计算机科学,2007,34(1):281-284. 被引量:7
  • 4樊静淳.论可信计算的研究与发展[J].济南职业学院学报,2007(3):47-48. 被引量:1
  • 5Trusted Computing Group. TCG TPM Main Specification, Version1.2 Revision 94, Part 1, Design Principles[Z]. (2006-03-29). https:l/www.trustedcomputinggroup.org.
  • 6Trusted Computing Group. TCG TPM Main Specification, Version 1.2 Revision 94, Part 2, TPM Structures[Z]. (2006-03-29). https:// www.trustedcomputinggroup.org.
  • 7Trusted Computing Group. TCG TPM Main Specification, Version 1,2 Revision 94, Part 3, TPM Commands[Z], (2006-03-29). https:// www.trustedcomputinggroup.org.
  • 8Trusted Computing Group. TCG PC Client Specific TPM Interface Specification(TIS), Version 1.2[Z]. (2006-03-29). https://www. Trustedcomputinggroup.org.
  • 9Chow T S. Testing Software Design Modeled by Finite-state Machines[J]. IEEE Trans. on Software Engineering, 1978, SE-4(3): 178-187.
  • 10Su Man-Yun, Shih Che-Hua, Huang Juinn-Dar, et al, FSM-based Transaction-level Functional Coverage for Interface Compliance Verification[C]//Proceedings of the 2006 Conference on Asia South Pacific Design Automation. Yokohama, Japan: [s. n.], 2006: 448-453.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部