期刊文献+

独立可执行设备支持的终端代码防篡改技术研究 被引量:2

Code Tamper-resistant Technologies Study Based on Stand-alone Executable Device
下载PDF
导出
摘要 终端代码防篡改技术研究对保护网络终端安全具有重要意义,是信息安全研究的热点问题之一.在分析常见网络终端体系结构脆弱性问题的基础上,提出一种以硬件为核心的终端代码防篡改方案.该方案通过构建独立可执行环境来解决程序运行过程中的完整性保护问题,通过物理隔离和强制访问控制解决数据机密性保护问题.最终采用通用USB-KEY和部分终端代码仿真实现独立可执行设备原型,并对其主要功能和性能进行了测试.实验结果表明,该方案能够利用较低成本的硬件资源,为网络终端内目标程序提供防篡改保护. The research of terminal code tamper-resistant technology is important to network endpoint security protection which is a hot topic in information security research. With the analysis of vulnerability in common network terminal architecture, a tamper-resistant method which is based on hardware was presented. The method uses the stand-alone executable environment to deal with the issue of integrity protection, and uses the physical isolation and mandatory access control to deal with the issue of confidentiality protection. At last, a simulation prototype system based on proposed method was constructed, which included a general-purpose USB-KEY hard- ware and some PC software modules. The testing of prototype system contains functions and performance test, and the result shows that proposed method, which is based on low-cost hardware resources, is able to provide tamper-resistant protection for target program in the network terminal.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第12期2809-2813,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划目标导向项目(2009AA01Z434)资助
关键词 信息系统安全 可信计算 代码防篡改 软件保护 information security trusted computing tamper proofing software protection
  • 相关文献

参考文献1

二级参考文献41

  • 1Hoi C, Atallah J M. Protecting software code by guards [G]//LNCS 2320: Proc of DRM Workshop. Berlin: Springer, 2001: 125-141.
  • 2Business Software Alliance. Fifth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2008. [2010-01-16]. http:// portal. bsa. org/ideglobalstudy2007/studies/2007_global_piracy_ study. pdf.
  • 3Business Software Alliance. Sixth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2009. [2010-01-16]. http:// portal. bsa. org/globalpiracy2008/studies/globalpiracy2008. pdf.
  • 4David L, Thekkath C, Mitchell M, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Systems, New York: ACM, 2000: 168-177.
  • 5Aucsmith D. Tamper Resistant Software : An implementation [G]//LNCS 1174: Proc of the 1st Int Workshop on Information Hiding. Berlin: Springer, 1996: 317-333.
  • 6Bryant E D, Atallah M J, Stytz M R. A Survey of Anti-tamper Technologies [J]. CrossTalk: The Journal of Defense Software Engineering, 2004, 17(11): 12-16.
  • 7Gleb N, Nasir M. Preventing piracy, reverse engineering, and tampering[J]. IEEE Computer, 2003, 36(7): 64-71.
  • 8Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection [J]. IEEE Trans on Software Engineering, 2002, 28(8) : 735-746.
  • 9Giffin J T, Christodoreseu M, Kruger L. Strengthening software self-checksumming via self-modifying code [C] // Proc of the 21st ACSAC. Washington, DC: IEEE Computer Society, 2005:23-32.
  • 10Wurster G, Oorschot P C, Somayaji A, et al. A generic attack on checksumming-based software tamper resistance [C]//Proc of IEEE Syrup on S&P. Washington, DC.. IEEE Computer Society, 2005: 127-138.

共引文献24

同被引文献10

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部