期刊文献+

一种不依赖TPM的安全引导方式的设计与实现 被引量:2

Design and Implementation of a Secure Boot without TPM Support
下载PDF
导出
摘要 在深入研究可信平台模块(TPM)和kexec相关技术的基础上,针对未安装TPM芯片的计算终端设计并实现了一种安全引导方式。该引导方式参考了可信平台模块的安全引导机制,在操作系统启动前,预先启动一个受保护的小型Linux系统,对操作系统的运行环境进行信任度量,验证BIOS和操作系统的完整性,为操作系统的启动提供一个可信赖的计算环境,然后使用kexec工具切换到磁盘操作系统。经过实验验证,文中设计的引导方式可以为Windows和Linux等多种平台的计算机终端提供安全引导支持,预引导系统验证系统运行环境的时延对系统启动总耗时的影响不明显。该引导方式是一种在不改变现有计算机硬件的基础上实现安全引导,是对现有计算机系统的安全增强措施。 Investigating in depth the technology of trusted platform module { TPM ) and kexec, design and implement a secure boot mechanism for computers without TPM support. In this scheme, referencing the secure boot mechanism based on TPM, a small protected Linux will start first, which can then measure the real operating system needed to boot at the early stage. After the measurement, can boot the operating system on disk by utilizing kexec. The mechanism designed by this paper can support Windows and Linux according to the experiments,and it was also shown that no obvious burden has been added to the whole system boot time. This mechanism is one of secure boots for existing computer without changing hardware, is a kind of security enhancement measures for computer system.
出处 《计算机技术与发展》 2012年第6期143-146,共4页 Computer Technology and Development
基金 国家高技术研究发展计划"863"项目(2009AA01Z40)
关键词 信息安全 安全引导 预引导系统 kexec 完整性度量 information security secure boot pre-boot system kexec integrity measure
  • 相关文献

参考文献12

  • 1Parno B. Bootstrapping trust in a " trusted" platform [ C ]// Proceedings of the 3rd conference on hot topics in security. Berkeley, C A, USA : USENIX Association,2008.
  • 2陈书义,闻英友,赵宏.基于条件谓词逻辑的可信计算形式化分析[J].华南理工大学学报(自然科学版),2009,37(5):106-110. 被引量:3
  • 3TPM Main Specification Level 2 Version 1.2, Revision 116 [ EB/OL]. (2011-03 -01 ) [2011 - 11 - 14]. http://www. trustedcomputinggroup, org/developers/trusted_platform_mod- ule/specifications.
  • 4陈建勋,侯方勇,李磊.可信计算研究[J].计算机技术与发展,2010,20(9):1-4. 被引量:10
  • 5张颖,周长胜.EFI下基于便携式TPM的可信计算平台研究[J].计算机技术与发展,2010,20(1):167-171. 被引量:5
  • 6Horman S. Kexec [ EB/OL ]. 2010 [ 2011 - 11 - 14 ]. http :// horms, net/projects/kexec/.
  • 7Nellitheertha H. Reboot Linux faster using kexec [ EB/OL]. 2004 [ 2011 - 11 - 14 ]. http ://www. ibm. com/developerworks! linux/library/1-kexec/index, html.
  • 8Heasman J. Implementing and Detecting an ACPI BIOS Root- kit[ C ]//Blackhat Federal 2006. Washington, DC: [ s. n. ], 2006.
  • 9Shingledecker R. Tiny Core Linux [ EB/OL]. 2008 [ 2011 - 11 - 14 ]. http ://www. tinycorelinux, com.
  • 10Advanced Computing Laboratory. at I~s Alamos National Labo- ratory ( LANL). Coreboot [ EB/OL]. ( 2011-06-24 ) [ 2011 - 11 - 14 ]. http ://www. coreboot, org/.

二级参考文献35

共引文献13

同被引文献13

  • 1英特尔开源软件技术中心,复旦大学并行处理研究所.系统虚拟化--原理与实现[M].北京:清华大学出版社,2009.
  • 2EMBLETON S, SPARKS S, ZOU C C.SMM rootkit:a new breed of OS independent malware[C]//Proc of the 4th International Confe-rence on Security and Privacy in Communication Networks.New York:ACM Press,2008:1-12.
  • 3QUENTIN C.Hacking GRUB for fun and profit[EB/OL].(2011-06-11).http://www.pharck.org /issues.html?issue=63&id=10.
  • 4GU Jun-kai, JI Wei-long.A secure bootstrap based on trusted computing[C]//Proc of International Conference of New Trends in Information and Service Science.[S.l.]:IEEE Press,2009:502-504.
  • 5Trust Computing Group.TCG specification architecture overview, version 1.4[EB/OL].(2007-08-02).http://www.trustedcomputinggroup.org.
  • 6PARNO B.Trust extension for commodity computers[J].Communications of the ACM,2012,55(6):76-85.
  • 7KIM S, PARK J, LEE K, et al.A brief survey on rootkit techniques in malicious codes[J].Journal of Internet Services and Information Security,2012,3(4):134-147.
  • 8谭良,周明天.基于可信计算平台的可信引导过程研究[J].计算机应用研究,2008,25(1):232-234. 被引量:8
  • 9徐震,沈丽红,汪丹.一种可配置的可信引导系统[J].中国科学院研究生院学报,2008,25(5):626-630. 被引量:10
  • 10秦中元,沈日胜,张群芳,狄予兴.虚拟机系统安全综述[J].计算机应用研究,2012,29(5):1618-1622. 被引量:24

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部