期刊文献+

基于SHA-1模块的可信嵌入式系统安全启动方法 被引量:5

The research of trusted embedded system secure startup based on SHA-1 module
原文传递
导出
摘要 在可信嵌入式系统中,嵌入式设备启动过程的安全是运行状态安全的基础,因此提出了一种可信嵌入式系统安全启动方法。针对可信嵌入式系统中的嵌入式设备原有硬件结构不改变的情况,在嵌入式设备上电后进行交互验证,然后再利用SHA-1模块对启动过程中的程序代码进行完整性度量。实验结果表明,设计的SHA-1模块功能可靠,能够应用在可信嵌入式系统中实现完整性度量,从而结合系统上电交互验证过程实现嵌入式设备的安全启动。该方法能够保持现有嵌入式设备的原有硬件结构不变,具有普遍的适应性。 In the trusted embedded system, the security of embedded equipments startup process is the foundation of the running state security. Therefore, one method of trusted embedded system secure startup was proposed. In view of the intrinsic hardware structure of embedded equipment not to change, cross validation was done after embedded equipment was powered. Then, the integrity of the program codes of startup process were checked by using SHA-1 module. The obtained results show that the designed SHA-1 module is correct, and it can be applied in trusted embedded system to realize integrity measurement. Combined with the process of cross validation after powered, the embedded system se- cure startup is realized. The method can keep the intrinsic hardware structure of embedded equipment, and it has univer- sal applicability.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2012年第9期1-6,共6页 Journal of Shandong University(Natural Science)
基金 重庆市经信委科技攻关计划资助项目(10-cxy-02)
关键词 可信嵌入式系统 安全启动 SHA-1 trusted embedded system secure startup SHA-1
  • 相关文献

参考文献15

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2陈书义,闻英友,赵宏.基于可信计算的移动平台设计方案[J].东北大学学报(自然科学版),2008,29(8):1096-1099. 被引量:14
  • 3ZHAO Bo, ZHANG Huangguo, LI Zhede. A trusted start-up based on embedded system [ C ]// Proceedings of IEEE 9th International Conference on Computer and Infor- mation Technology. Washington: IEEE Computer Socie- ty, 2009, 2:242-246.
  • 4ZHAO Bo, XIONG Quan, ZHANG Huanguo, et al. Bus arbitration mechanism in embedded system based on trust computing[ C ]// Proceedings of 2008 International Con- ference on Wireless Communications, Networking and Mobile Computing. [ S. 1. ] : IEEE Computer Society, 2008 : 1-4.
  • 5赵波,张焕国,李晶,陈璐,文松.可信PDA计算平台系统结构与安全机制[J].计算机学报,2010,33(1):82-92. 被引量:49
  • 6HUANG Hua-qiang, HU Chen, HE Jian-hua. To Verify Embedded System Software Integrity with TCM and FP- GA [ C]// 2010 3rd IEEE International Conference on Computer Science and Information Technology. Piscat- away: IEEE Computer Society, 2010:65-70.
  • 7张焕国,李晶,潘丹铃,赵波.嵌入式系统可信平台模块研究[J].计算机研究与发展,2011,48(7):1269-1278. 被引量:39
  • 8WINKLER Thomas, RINNER Bernhard. Trust CAM-Se- curity and privacy-protection for an embedded smart cam- era based on trusted computing [ C ]// IEEE International Conference on Advanced Video and Signal Based Surveil- lance. Boston: IEEE Computer Society. 2010:593-600.
  • 9WINKLER Thomas, RINNER Bernhard. Securing em- bedded smart cameras with trusted computing [ J ]. Eurasip Journal on Wireless Communications and Networking, 2011, 2011: 8.
  • 10李小将,梅栾芳,师俊芳,陈娟.基于TCM的嵌入式可信终端系统设计[J].计算机工程与设计,2010,31(4):733-735. 被引量:12

二级参考文献159

共引文献363

同被引文献34

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2李英丽.脑卒中偏瘫早期康复的研究进展[J].生物磁学,2005,5(3):51-52. 被引量:7
  • 3史江一,郝跃,朱志炜,潘伟涛.SoC中的IP核同步设计方法[J].电子器件,2007,30(3):984-987. 被引量:2
  • 4韦东山.嵌入式Linux应用完全开发手册[M].北京:人民邮电出版社,2008.
  • 5JOHNSTON S C, MENDIS S, MATHERS C D. Global vari- ation in stroke burden and mortality; estimates from monito- ring, surveillance, and modelling [-J. Lancet Neurol, 2009, 8(4) ; 345-354.
  • 6Dietrich K, Winter J.Implementation aspects of mobile and embedded trusted computing[M]//Trusted Computing.Berlin Heidelberg : Springer, 2009 : 29-44.
  • 7MPWG T C G.The TCG mobile trusted module specifi- cation[J].TCG Specification Version 1.0 Revision,1.
  • 8Lin K J, Wang C Y.Using tpm to improve boot security at bios layer[C]//2012 IEEE International Conference on Consumer Electronics(ICCE).[S.l.] : IEEE, 2012 : 376-377.
  • 9Ryan M D.Automatic analysis of security properties of the TPM[M]//Trusted Systems.Berlin Heidelberg:Springer, 2012: 1-4.
  • 10Winter J.Trusted computing building blocks for embedded linux-based ARM trustzone platforms[C]//Proceedings of the 3rd ACM Workshop on Scalable Trusted Com- puting.[S.l.] : ACM, 2008 : 21-30.

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部