期刊文献+

基于可信平台模块的虚拟单调计数器研究 被引量:2

Virtual Monotonic Counters Using Trusted Platform Module
下载PDF
导出
摘要 分析了存储中常见的重放攻击问题,提出一种基于可信平台模块TPM构造虚拟单调计数器的方案以阻止重放攻击.该方案基于TPM提供的硬件计数器、传输会话与私钥保护3种机制建立起虚拟计数器管理器(virtual counter manager,VCM),再由VCM构造和管理虚拟单调计数器.同时提出了一种VCM恶意行为检测算法,用以确保VCM的可信性,使得该方案的安全性仅依赖于TPM的防篡改性.最后,通过实验分析,提出了2个性能改进方案,以确保方案的可行性. Any security storage system needs to address at least three security issues:confidentiality,integrity and freshness.Of these,freshness is the most challenging problem.However,the traditional software-based solutions themselves are on the storage device,such as a hard disk.Hence,they can not solve the problem.The attacker can replay the whole disk data using an "out-of-date" image of hard disk.Thus,the only solution to this problem would be to employ some form of irreversible state change.In this paper,we analyze the problem of replay attacks upon storage,and propose a TPM-based solution to build virtual counters,in order to defend against replay attacks.In this solution,we build a virtual counter manager(VCM)with three mechanisms in TPM:TPM Counters,transport sessions and protection of private keys;and then we can create and manage lots of trusted virtual counters with VCM.Furthermore,an algorithm for checking malicious operations of VCM is presented in order to ensure the trust of it.Hence,the security of our solution just depends on the tamper-resistant module TPM.Finally,the performance of our solution is analyzed,and two changes are proposed to improve the performance in order to keep the solution of anti-replay attacks feasible.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第3期415-422,共8页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2007AA01Z412) 国家科技支撑计划基金项目(2008BAH22B06) 中国科学院知识创新工程领域前沿项目(ISCAS2009-DR14 ISCAS2009-GR03)
关键词 可信计算 重放攻击 可信平台模块 单调计数器 传输会话 trusted computing replay attack TPM monotonic counter transport session
  • 相关文献

参考文献14

  • 1Dijk M van, Rhodes J, Sarmenta L F G, et al. Offline untrusted storage with immediate detection of forking and replay attacks [C] //Proc of the 2007 ACM Workshop on Scalable Trusted Computing (STC'07). New York: ACM, 2007:41-48.
  • 2Sarmenta L F G, Dijk M van, O'Donnell C W , et al. Virtual monotonic counters and count-limited objects using a TPM without a yrusted OS [C] /]Proc of the 1st ACM Workshop on Scalable Trusted Computing (STC'06). New York: ACM, 2006:27-42.
  • 3Ahmad-Reza S, Marcel S, Christian S, et al. TCG Inside?: A note on TPM specification compliance [C]//Proc of the 1st ACM Workshop on Scalable Trusted Computing. New York: ACM, 2006: 47-56.
  • 4李昊,冯登国,陈小峰.可信密码模块符合性测试方法与实施[J].武汉大学学报(理学版),2009,55(1):31-34. 被引量:13
  • 5李昊,胡浩,陈小峰.可信密码模块符合性测试方法研究[J].计算机学报,2009,32(4):654-663. 被引量:10
  • 6Sailer Reiner, Zhang Xiaolan, Jaeger Trent, et al. Design and implementation of a TCC-based integrity measurementarchitecture [C] //Proc of the 13th Usenix Security Syrup. San Diego: USENIX Security Symposium, 2004:223-238.
  • 7Ahmad-Reza S, Christian S. Property-based attestation for computing platforms : Caring about properties, not mechanisms [C] //Proc of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004: 67-77.
  • 8Chen Liqun, Landfermann R, Lohr H, et al. A protocol for protocol for property-based attestation [C] //Proc of the 1st ACM Workshop on Scalable Trusted Computing. New York: ACM, 2006:7-16.
  • 9冯登国,秦宇.可信计算环境证明方法研究[J].计算机学报,2008,31(9):1640-1652. 被引量:33
  • 10Trusted Computing Group. TPM Main Part 1, Design Principles, Specification Version 1.2 [OL]. [2005-11-02]. http://www.trustedcomputinggroup, org.

二级参考文献45

  • 1易国洪,卢炎生.基于EFSM模型的等价类测试[J].计算机科学,2007,34(1):281-284. 被引量:7
  • 2Trusted Computing Group. TPM Main Specification: Design Principles V1. 2[EB/OL]. [2007-12-17]. http : / / www. trustedcomputinggroup.
  • 3Atmel Corporation. AT97SC3201 Security Target Version2. 3 [EB/OL]. [-2007-12-21]. http://www. commoncriteriaportal. org/ files/epfiles/ST _ VID- 3005-ST. pdf.
  • 4Atmel Corporation. AT97SC3201:The Atmel Trusted Platform Module[EB/OL]. [ 2007-12-29 ]. http:// www. atmel.com/dyn/resources/ prod _ documents/ doc5010. pdf.
  • 5Ahmad-Reza S, Marcel S, Christian S, et al. TCG Inside: A Note on TPM Specification Compliance[C]//Proceedings of the First ACM Workshop on Scalable Trusted Computing. New York : ACM Press, 2006 : 47-56.
  • 6Danilo B, Lorenzo C, Andrea L, et al. Replay Attack in TCG Specification and Solution [ C]//21th Annual Computer Security Application Conference (ACSAC' 05). Tucson: IEEE Press, 2005 : 127-137.
  • 7Beizer B. Black-Box Testing : Techniques for Functional Testing of Software and Systems [M]. New York:John Wiley & Sons Press, 1995.
  • 8Beizer B. Software Testing Techniques [M]. New York: International Thomson Computer Press, 1990.
  • 9Cheng K T Using the Automatic Generation of Functional Vectors Extended Finite StateMachine Model[ C ]// ACM Transactions oil Design Automation of Electronic Systems. New York: ACM Press, 1996:57-79.
  • 10Trusted Computing Group. TPM Main Part 1, Design Principles. Specification Version 1.2, Revision 62. 2, October, 2003

共引文献50

同被引文献40

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2张焕国,严飞,傅建明,徐明迪,杨飏,何凡,詹静.可信计算平台测评理论与关键技术研究[J].中国科学:信息科学,2010,40(2):167-188. 被引量:13
  • 3冯登国,秦宇.一种基于TCM的属性证明协议[J].中国科学:信息科学,2010,40(2):189-199. 被引量:8
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 5沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 6李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 7Chow R, Golie P, J akobsson M, et al. Controlling data in the cloud outsourcing computation without outsourcing control [C] ffProc 01 the ACM Cloud Computing Security Workshop (CCSW 09). New York: ACM, 2009: 85-90.
  • 8Pearson S, Shen Yun, Mowbray M. A privacy manager lor cloud computing [C]//Proc of the 1st Int Conlon Cloud Computing (CloudCom 2009). Los Alamitos, CA: IEEE Computer Society, 2009: 90-106.
  • 9Hwang Kai, Li Deyi. Trusted cloud computing with secure resources and data coloring [J]. Journal of Internet Computing, 2010, 14(5): 14-22.
  • 10Naruchitparames J, Gunes M. H. Enhancing data privacy and integrity in the cloud [C]//Proc of Int Conlon High Performance Computing and Simulation (HPCS). Piscataway, NJ: IEEE, 2011: 427-434.

引证文献2

二级引证文献123

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部