期刊文献+

基于动态安全属性保护的可信固件 被引量:2

Trusted Firmware Based on Dynamic Security Attribute Protection
下载PDF
导出
摘要 遵循TCG可信计算的固件通过可信度量和信任传递保证固件模块及OS Loader的完整性。这种可信固件当前实现的缺点在于只保护了系统的静态安全属性,而对动态安全属性保护无能为力。基于此,通过对固件代码和数据的分类研究,对固件代码和数据进行安全分级控制,提出固件动态安全属性保护模型,在EFI/UEFI可信固件的基础上实现动态安全属性的保护。实验证明,该方法简单有效,适合于固件代码尺寸小、启动速度快的要求。 Trusted firmware compliant with TCG uses trust measurement and trust transition to assure that other modules in firmware and OS Loader are in its integrity. The disadvantage of this method is that it can assure static security attributes about firmware system, but cannot assure dynamic security attributes. Based on study about types of code and data in firmware, a security model assuring dynamic security attribute, which combines trust measurement and classification of code and data, is proposed. Furthermore, this model is simple and efficient enough to meet firmware's need for small size and fast boot.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第4期137-139,共3页 Computer Engineering
基金 辽宁省教育厅科技研究基金资助项目(L2010386) 沈阳市2009年重点实验室建设基金资助项目(1091244-1-00)
关键词 静态安全属性 动态安全属性 可信计算 可信固件 static security attribute dynamic security attribute trusted computing trusted firmware
  • 相关文献

参考文献6

  • 1周振柳,刘宝旭,池亚平,许榕生.计算机BIOS安全风险分析与检测系统研究[J].计算机工程,2007,33(16):114-116. 被引量:13
  • 2Heasman J. Implementing and Detecting an ACPI BIOS Rootkit[C] //Proc. of Blackhat'06. Washington D. C., USA: [s. n.], 2006.
  • 3Heasman J. Implementing and Detecting an PCI Rootkit[C]//Proc. of Blackhat'07. Washington D. C., USA: [s. n.], 2007.
  • 4Wojtczuk R, Rutkowska J. Attacking Intel Trusted Execution Technology[C]//Proc. of Blackhat'09. Washington D. C., USA: [s. n.], 2007.
  • 5TCG. TCG PC Specific Implementation Specification Version 1.1 [EB/OL]. (2003-08-04). www.trustedcomputing.org.
  • 6Zhou Zhenliu, Xu Rongsheng. BIOS Security Analysis and a Kind of Trusted BIOS[C]//Proc. of the 9th International Conference on Information and Communications Security. Zhengzhou, China: [s. n.], 2007: 427-437.

二级参考文献4

  • 1Compaq,Phoenix,Intel.BIOS Boot Specification v1.01[Z].(1996-10).http://www.phoenix.com/NR/rdonlyres/56E38DE2-3E6F-4743-835F-B4A53726ABED/0/specsbbs101.pdf.
  • 2Einarsson S,Rausand M.An Approach to Vulnerability Analysis of Complex Industrial Systems[J].Risk Analysis,1998,18(5):535-546.
  • 3TCG.TCG Specification Architecture Overview v1.2[Z].(2004-08).http://www.trustedcomputinggroup.org/groups/TCG_1_0_Architectu-re_Overview.pdf.
  • 4杨柳.计算机安全:封堵BIOS漏洞[J].瞭望,2004(19):52-53. 被引量:3

共引文献12

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部