期刊文献+

一种轻量级安全可信的虚拟执行环境 被引量:4

A light-weight, secure and trusted virtual execution environment
原文传递
导出
摘要 针对传统TCB(trusted computing base)庞大复杂的问题,设计并实现了一个最小化的TCB系统架构.利用CPU的系统管理模式(SMM)提供的硬件隔离特性,通过将应用程序中对安全敏感的代码放入虚拟环境中执行,从而将应用程序本身非安全敏感部分代码、操作系统及其上运行的其他应用程序排除在TCB之外,使得TCB的软件部分只包含安全敏感代码和虚拟执行环境包含的少量代码,实现了TCB的最小化.本系统的强隔离性使得在操作系统和部分硬件(如DMA、硬件调试器等)被攻击者控制后,依然可以保证安全敏感代码执行过程的隐秘性和执行结果的完整性.同时,本系统还为执行结果提供了细粒度的可靠验证,保证结果是在本系统的保护下得到的,没有被任何恶意程序篡改. Traditional trusted computing base (TCB) contains the OS, device drivers, and all the applications, and the validation of the entire TCB is tremendously complicated. To solve this problem, we propose a TCB minimization architecture that leverages hardware isolation features such as system management mode provided by CPU, executing security-sensitive code of applications in a virtual environment to exclude these unsecure- sensitive code, OS and other applications out of TCB, which makes the TCB only include security-sensitive code and some management code of the virtual environment. Even if attackers control OS and part of hardware (DMA, hardward debugger, etc.), the isolated environment can guarantee the security and integrity of sensitive code execution. Meanwhile, the system provides reliable fine-grained validation, which convinces that the correct security-sensitive code is executed and the whole execution is protected by our system.
出处 《中国科学:信息科学》 CSCD 2012年第5期617-633,共17页 Scientia Sinica(Informationis)
基金 国家重点基础研究发展计划(批准号:2007CB310900) 国家自然科学基金(批准号:61173166 60803130) 中央高校基本科研业务费资助项目
关键词 可信计算 可信计算基 系统管理模式 虚拟化 最小化TCB trusted computing, trusted computing base(TCB), system management mode (SMM), virtualiza-tion, TCB minimization
  • 相关文献

参考文献10

  • 1Intel.R64and IA-32Architectures Software Developer’’s Manual Volume3B:System Programming Guide[]..
  • 2Rafal W,Joanna R.Attacking SMM Memory via IntelRCPU Cache Poisoning. http://invisiblethingslab.com/resources/misc09/ .
  • 3http://stealth.openwall.net/rootkits/ .
  • 4Lenin S,Calton P,Hermann H,et al.Reducing TCB complexity for security-sensitive applications:three case studies[].ACM SIGOPS Oper Syst Rev.2006
  • 5Kilpatrick D.Privman:A library for partitioning applications[].USENIX Annual Technical Conference.2003
  • 6Brumley D,Song D.Privtrans:Automatically partitioning programs for privilege separation[].Proceedings of USENIX Security Symposium.2004
  • 7Ta-Min R,Litty L,Lie D.Splitting interfaces:making trust between applications and operating systems configurable[].Proceedings of theth USENIX Symposium on Operating Systems Design and Implementation (OSDI).2006
  • 8Smith S W,Weingart S.Building a high-performance programmable secure coprocessor[].Comput Netw J Comput Telecommun Netw.1999
  • 9Jonathan M M,Bryan P,Adrian P,et al.Minimal TCB code execution (extended abstract)[].Proceedings of the IEEE Symposium on Security and Privacy (SP).2007
  • 10McCune J M,Parno B,Perrig A,et al.How low can you go?recommendations for hardware-supported minimal TCB code execution[].Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).2008

同被引文献23

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部