期刊文献+

TPM 2.0策略授权机制的安全缺陷及其改进方案 被引量:3

Security Risk and Improved Scheme for TPM 2.0 Policy Authorization
原文传递
导出
摘要 分析了可信平台模块TPM 2.0策略授权方式的安全性,开发了专门的灰盒测试系统对TPM 2.0的安全性进行了一系列测试,发现它存在两个潜在的安全隐患:信息泄露安全隐患和授权认证安全隐患.给出了利用该安全隐患暴力破解策略授权的实现方法并提出了一种基于共享密钥的授权会话加解密方案来对整个策略授权过程进行改进.实验结果表明,该改进方案可以很好的保证策略授权过程的安全性. The security of trusted platform module TPM 2.0 policy authorization was analyzed. By using a spe cialized tools we designed , a series of gray-box testing was made, and two security risks information leakage and au thentication risk were found. The attack method and an improved scheme based on shared key encryption were given. The experimental results show that the improved scheme can ensure the process of policy authorization security.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2014年第6期478-484,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家重点基础研究发展计划(973)项目(2014CB340600) 国家自然科学基金重点项目(61332019) 国家自然科学基金(61173138 61272452 61103220)资助项目 湖北省重点新产品工艺研究开发项目(2012BAA03004) 湖北省企业合作项目(YB2012120174 YB2013110084)
关键词 可信计算 TPM2.0 策略授权 安全威胁 trusted computing TPM 2.0 policy authorization security risk
  • 相关文献

参考文献9

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2赵波,张焕国,李晶,陈璐,文松.可信PDA计算平台系统结构与安全机制[J].计算机学报,2010,33(1):82-92. 被引量:49
  • 3Trusted Computing Group.TPM Rev 2.0Part.1.Architecture00.93.p121009[EB/OL].[2012-10-09].http://www.trustedcomputinggroup.org/files/resource_files/71486ED4-1A4B-B294-D0B7236AFE47790B/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2000.93p%20121009.pdf.
  • 4Trusted Computing Group.TPM Rev 2.0Part.2.Structures00.93.p121009[EB/OL].[2012-10-09].http://www.trustedcomputinggroup.org/files/resource_files/71497C58-1A4B-B294-D0E3838846 031907/TPM%20Rev%202.0%20Part%202%20-%20Structures%2000.93p%20121009.pdf.
  • 5Trusted Computing Group.TPM Rev 2.0Part.3.Commands.00.93.p121009[EB/OL].[2012-10-09].http://www.trustedcomputinggroup.org/files/static_page_files/6A7 D0F66-1A4B-B294-D01FE92A27384812/PM%20Rev%202.0%20Part%203%20-%20Commands%2000.96%20130315-code.pdf.
  • 6Trusted Computing Group.TPM Rev 2.0Part.4.Supporting.Routines.00.93.p121009[EB/OL].[2012-10-09].http://www.trustedcomputinggroup.org/files/static_page_files/6A7 DFC58-1A4B-B294-D0EB34 D7865C0C50/TPM%20Rev%202.0%20Part%204%20-%20Supporting%20Routines%2000.96%20130315-code.pdf.
  • 7Lin A H.Automated Analysis of Security APIs[D].Cambridge:Massachusetts Institute of Technology,2005.
  • 8Chen L,Ryan M.Formal Aspects in Security and Trust[M].Berlin:SpringerHeidelberg,2010:201-216.
  • 9Chen L,Ryan M.Offline dictionary attack on TCG TPM wWeek authorisation data and solution[C]//Future of Trust in Computing.Vriesbaden:Vievreg+Teubner,2009:193-196.

二级参考文献110

共引文献288

同被引文献34

引证文献3

二级引证文献150

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部