期刊文献+

基于应用π演算的可信平台模块的安全性形式化分析 被引量:5

Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus
下载PDF
导出
摘要 可信平台模块(trusted platform module,TPM)是信息安全领域热点研究方向可信计算的关键部件,其安全性直接影响整个可信计算平台的安全性,需要对其进行安全性验证.针对已有工作对TPM规范中多类安全性问题进行形式化建模与验证过程中所存在的不足,从分析TPM和使用者的交互过程出发,使用应用π演算对TPM进行形式化建模,把TPM规范中定义的各实体行为特性抽象成为进程的并发安全性问题,在讨论并发进程中机密性、认证性和弱机密性的基础上,对交互模型进行安全性论证,提出并使用自动定理证明工具验证了对应安全属性的改进方案. Trusted computing is a popular paradigm to ename Computers, security than is possible in software alone. The core hardware component, named trusted platform module (TPM), is designed to achieve this goal. As there are many relevant products on the market and some attacks have already been found, it is very necessary to carry out the security analysis of TPM. However, because TPM is a complex security component whose specification is too long to be completely covered, the existing work hasn't formally or fully analyzed the issues about the various security properties. An applied π calculus model of the interactive processes between TPM and its user is proposed as a solid foundation for discussing the various security properties. Based on the formal model, the secrecy, authentication and weak secrecy problems of TPM are identified and formalized, some known attacks are rediscovered and some new attacks are found via a formal way rather than descriptions in natural language. Furthermore, the fixing proposals for the corresponding security vulnerabilities are presented and verified. In order to make the analysis and verification more accurate and efficient, the automatic theorem proving tool is also used during the analysis and verification.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1421-1429,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(91018008 60970115 60970116)
关键词 可信计算 可信平台模块 应用π演算 并发进程 安全性分析 Key words trusted computing trusted platform module (TPM) applied π calculus concurrentprocesses security analysis
  • 相关文献

参考文献4

二级参考文献56

共引文献96

同被引文献24

  • 1Trusted Computing Group. TPM Specification Version 1.2 Revision 103:Part 1-Design Principles[EB/OL].http://www.trustedcomputinggroup.org/files/resource _ files/646BE624-1D09-3519-ADDA61BE37A21A 74/mainP1DPrev103.pdf,2012.
  • 2Trusted Computing Group. TPM Specification Version 1.2 Revision 103:Part 2-Structures[EB/OL].http:// www.trustedcomputinggroup.org/files/resource _ files/8D3D 6571-1D09-3519-AD22EA2911D4E9D0/mainP2 Structrevl03.pdf,2012.
  • 3Trusted Computing Group. TPM Specification Version 1.2 Revision 103:Part 3-Commands[EB/OL].http:// www.trustedcomputinggroup.org/files/resource _ files/ E14 A09AD-1 A4B-B294-D049 ACC1 A1 A138ED/ mainP3Commandsrev103.pdf,2012.
  • 4ISO. ISO/IEC 11889-1.Information technologySecurity techniques-Trusted Platform Moduel-Part 1:Overview[S].Geneva:International Organization Standardization(ISO),2009.
  • 5Datta Anupam,Franklin Jason,Garg Deepak. A logic of secure systems and its application to trusted computing[A].Berkeley:IEEE,2009.221-236.
  • 6Bruschi D,Cavallaro L,Lanzi A. Replay attack in TCG specification and solution[A].Los Alamitos,CA:IEEE Computer Society,2005.127-137.
  • 7Chen L,Ryan M D. Offline dictionary attack on TCG TPM weak authorization data and solution[A].Wiesbaden:Vieweg &-Teubner,2009.193-196.
  • 8Chen L,Ryan M D. Attack,soulution and verification for shared authorization data in TCG TPM[A].{H}Berlin:Springer-Verlag,2010.201-216.
  • 9谭良,刘震,周明天.TCG架构下的证明问题研究及进展[J].电子学报,2010,38(5):1105-1112. 被引量:7
  • 10冯登国,秦宇,汪丹,初晓博.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. 被引量:116

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部