期刊文献+

具有可信计算架构的安全操作系统实现方法 被引量:3

Secure Operating System Realization Method with Trusted Computing Architecture
下载PDF
导出
摘要 为解决嵌入式系统设备的安全性问题,在操作系统内核一级建立信息安全体系,提出一种安全可信操作系统的实现方法。在Linux基础上实现非对称加密认证、地址隐藏、安全存储、进程可信认证等关键技术,从而构造出可信计算架构,使得操作系统内核可从行为安全方面对系统驱动、应用程序等进程提供可信认证,阻止认证失败的进程在系统上运行。实验结果证明了可信计算架构的正确性,并能实现对嵌入式系统设备的安全保护。 To solve the security problem of the embedded system equipment,this paper establishes information security system at the operating system kernel level, and proposes the implementation of a secure operating system. The key technology of the trusted computing architecture about asymmetric encryption and authentication, address hidden and safety storage, trusted authentication for process is realized and joined to the original Linux Operating System (OS) , and the secure OS with the trusted computing architecture is formed. The secure OS can provide the behavior of certification for the process to ensure that the whole information system security. Experimental result proves that the correctness and applicability of trusted computing architecture, and the architecture can provide the security of the embedded system equipment.
作者 刘智臣
出处 《计算机工程》 CAS CSCD 北大核心 2015年第9期164-167,共4页 Computer Engineering
关键词 可信计算 非对称加密认证 地址隐藏 安全存储 可信认证 trusted computing asymmetric encryption authentication address hidden safety storage trusted authentication
  • 相关文献

参考文献12

  • 1肖敬,喻超,毋国庆.一种基于嵌入式安全系统的可信计算机系统[J].计算机工程,2006,32(13):246-247. 被引量:3
  • 2王博,李波,高振铁,陈磊.基于TPM的嵌入式可信计算平台设计[J].单片机与嵌入式系统应用,2011,11(1):13-16. 被引量:4
  • 3Potter B. High Time for Trusted Computing( J]. Security & Privacy ,2009,7 ( 6 ) :54-56.
  • 4Goh W,Yeo C K. Teaching an Old TPM New Tricks: Repurposing for Identity-based Signatures [ J ]. Security & Privacy,2013,11 (5) :28-35.
  • 5刘海雷,王震宇,马鸣锦,刘鑫杰.嵌入式可信终端TPM接口的研究与实现[J].计算机工程与设计,2008,29(13):3316-3318. 被引量:7
  • 6DavidC,RyanC.可信计算[M].赵波,译.北京:机械工业出版社,2009.
  • 7Rahmatian M, Kooti H, Harris I G, et al. Hardware- assisted Detection of Malicious Software in Embedded SystemsE J ]. Embedded Systems Letters, 2012,4 ( 4 ) : 94 -97.
  • 8Schaumont P,Raghunathan A. Guest Editors' Introduction: Security and Trust in Embedded-systems Design I J 1. Design & Test of Computers ,2007,24(6) :518-520.
  • 9Zhang Huanguo, Mu Yi. Trusted Computing and Infor- mation Security [ J ]. Communications,2013,10 ( 11 ).
  • 10Oliveira D P R,Andreia F M L, Delisandra F V, et al. Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems [ J ]. Latin America Transactions, 2014,12(6) :1141-1148.

二级参考文献32

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:253
  • 2David Challener, Kent Yoder, Ryan Catherman.可信计算[M].赵波,严飞,余发江,等译.北京:机械工业出版社,2008:9.
  • 3刘博,韩臻.可信计算平台中TOCTOU攻击的响应方法:TCTP2009:第一届中国可信计算理论与实践学术会议论文集[c].北京:清华大学出版社,2009:84-85.
  • 4D. Dagon, T. Martin, T. Staner. Mobile Phones as Corn puting Devices.. The Viruses are Coming![J]. IEEE Pervasive Computing, 2004, 3(4); 11-15.
  • 5System management bus (SMBus) specification version 2.0 [S/OL] ,2000E2010 - 071. http://www, smbus, org.
  • 6Trusted Computing Group. TPM Main Part 3[S/OL] , 2006 [2010 - 07]. http ://www. trustedcomputinggroup, org.
  • 7Trusted Computing Platform Alliance.Main specification[EB/OL].http://www.cl.cam.ac.uk/~rja14/tcpa.html,2001.
  • 8Trusted Computing Platform Alliance.PC Specification Implementation Specification[EB/OL].http://www.cl.cam.ac.uk/~rja15/psis.html,2001.
  • 9Anderson R.TCPA/Palladium Frequently Asked Questions[EB/OL].http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html,2001.
  • 10高宏.可信计算机技术现状[EB/OL].http://www.infosec.org.cn/bbs/index.php?mods=topicdisplay&forumid=5&postid=12.

共引文献18

同被引文献22

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部