期刊文献+

一种基于完整性保护的终端计算机安全防护方法 被引量:4

Integrity Based Security Protection Method for Terminal Computer
下载PDF
导出
摘要 终端计算机是网络空间活动的基本单元,其安全性直接关系着网络环境和信息系统的安全。提出了一种基于完整性保护的终端计算机安全防护方法,它将完整性度量和实时监控技术相结合,保证终端计算机运行过程的安全可信。建立了以TPM为硬件可信基、虚拟监控器为核心的防护框架,采用完整性度量方法建立从硬件平台到操作系统的基础可信链;在系统运行过程中监控内核代码、数据结构、关键寄存器和系统状态数据等完整性相关对象,发现并阻止恶意篡改行为,以保证系统的完整、安全和可靠。利用Intel VT硬件辅助虚拟化技术,采用半穿透结构设计实现了轻量级虚拟监控器,构建了原型系统。测试表明,该方法能够对终端计算机实施有效的保护,且对其性能的影响较小。 Terminal computer is the basic unit of network activities, which is directly related to the security of network environment and information systems. An integrity based security protection method for terminal computer was pro- posed, which integrates integrity measurement and real-time monitoring technology to ensure the security and credibility of terminal computer. A protection framework was established, which uses TPM as hardware trusted base and virtual monitor as the core unit. Integrity measurement is used to establish the basic trusted chain from the hardware platform to operating system. And integrity related objects, such as kernel code, data structures, key registers and system status data,are monitored when the system is running to detect and prevent from malicious tampering in order to ensure sys- tem integrity, security and reliability. A lightweight virtual machine monitor was designed using Intel VT hardware-as- sisted virtualization technology and a prototype system was realized. Tests show that the method is effective and has less impact on the performance of terminal computer.
出处 《计算机科学》 CSCD 北大核心 2015年第6期162-166,174,共6页 Computer Science
基金 核高基专项资助
关键词 终端计算机 完整性 虚拟监控器 完整性度量 完整性监控 Terminal computer Integrity Virtual machine monitor Integrity measurement Integrity monitoring
  • 相关文献

参考文献10

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 2Bratus S, DCunha N, Sparks E, et al. TOCTOU, traps, and trusted computing [M]// Trusted Computing-Challenges and Applications. Springer Berlin Heidelberg, 2008 : 14-32.
  • 3石晶翔,陈蜀宇,黄晗辉.基于Linux系统调用的内核级Rootkit技术研究[J].计算机技术与发展,2010,20(4):175-178. 被引量:11
  • 4Petroni N L, Hicks M. Automated detection of persistent kernel control-flow attacks[C]//Proc, of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007 : 103-115.
  • 5Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants[J]. IEEE Transactions on De- pendable and Secure Computing, 2011,8 (5) : 670-684.
  • 6Trusted Computer Group. TCG Specification Architecture Over- view, versionl. 2 [EB/OL]. https://www, trustedcomputing- gruop, org.
  • 7Intel 6 4 and IA - 3 2 Architectures Software Developer ' s Manual Volume 3B: System Programming Guide[R]. Intel Corporation,1997-2009.
  • 8李博,沃天宇,胡春明,李建欣,王颖,怀进鹏.基于VMM的操作系统隐藏对象关联检测技术[J].软件学报,2013,24(2):405-420. 被引量:21
  • 9Hofmann O S, Dunn A M, Kim S, et al. Ensuring operating sys- tem kernel integrity with OSck[J]. ACM SIGPLAN Notices. ACM, 2011,46 (3) : 279-290.
  • 10Gadaleta F, Nikiforakis N, Miihlberg J T, et al. Hyperforce: Hy- pervisor-enforced execution of security-critical code[M]//Infor- mation Security and Privacy Research, Springer Berlin Heidel- berg, 2012 : 126-137.

二级参考文献19

共引文献387

同被引文献24

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部