期刊文献+

采用数字签名技术的可信启动方法研究 被引量:6

Research on the Trusted-Boot Technology Using Digital Signature Technique
下载PDF
导出
摘要 为保障嵌入式设备系统启动时的可信性,分析了现有可信启动技术对硬件模块严重依赖的现状,结合可信度量和可信链理论,提出了一套基于嵌入式Linux的可信启动方法。该方法以固件IROM作为信任根,利用数字签名和完整性验证技术检查启动实体的完整性和真实性,建立了一条从设备开机到内核启动的信任链。实验结果表明:该方法能有效地验证启动实体的完整性和真实性;与采用硬件模块保护启动实体预期度量值的方法比较,该方法无需增加任何硬件开销便可有效地保护预期度量值;同时保证实体更新时的可信检测。 Device booting is a critical step and the foundation of trust for embedded systems. Through analyzing related work we find that most current trusted boot technologies rely heavily on the hardware modules such as trusted platform module (TPM). A new trusted boot method is proposed in this paper for embedded Linux system, which is based on the trusted measurement policy and trust chain mechanism. Firstly, this approach takes the firmware IROM as root of trust, which is used to check the integrity and authenticity of the next booting step like BootLoader. Then the BootLoader do the same to the Kernel. So the chain of trust is established from the top of booting to the Kernel. Using the technology of digital signature and Hash algorithm, we implemented the integrity and authenticity checking for each booting entity. The results show that this method can verify the integrity and authenticity of booting entity, and protect the expected metric easily and effectively without other hardware modules. Besides, it ensures the integrity and authenticity of booting entity when they are updated.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2016年第3期448-452,共5页 Journal of University of Electronic Science and Technology of China
基金 国家核高基项目(M1401060112ZX0103301) 保密通信重点实验室基金(2014006275)
关键词 信任链 数字签名技术 嵌入式LINUX 信任根 可信启动技术 可信计算 chain of trust digital signature technique embedded Linux root of trust trusted boottechnology trusted computing
  • 相关文献

参考文献14

  • 1FENG Deng-guo. Trusted computing theory and practice[M]. Beijing: Tsinghua University Press, 2013.
  • 2ASOKAN N, EKBERG J E, KOSTIAINEN K, et al. Mobile trusted computing[J]. Proceedings of the IEEE, 2014, 102(8) 1189-1206.
  • 3YU Chao, YUAN Men-ting. Security Bootstrap based on trusted computing[C]2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing. Washington D C, USA: IEEE Computer Society, 2010: 486-489.
  • 4YU Fajiang ZHANG Huanguo.Design and Implementation of a Bootstrap Trust Chain[J].Wuhan University Journal of Natural Sciences,2006,11(6):1449-1452. 被引量:1
  • 5Trusted Computing Group. TCG mobile trusted module specification, specification version 1,0, revision 6[EB/OL]. [2014-11-26]. http://www.tmstedcomputinggroup.org/files/ resource files/87852F33- ID09-3519-ADOCOF141CC6B 10D/ Revision 6-tcg-mobile-trusted-module- 1 0pdf.
  • 6KAI Tang, XIN Xu, GUO Chun-xia . The secure boot of embedded system based on mobile trusted module[C]//2012 International Conference on Intelligent System Design and Engineering Application. New York, USA: IEEE, 2012: 1131-1134.
  • 7赵波,费永康,向騻,李逸帆.嵌入式系统的安全启动机制研究与实现[J].计算机工程与应用,2014,50(10):72-77. 被引量:17
  • 8张焕国,李晶,潘丹铃,赵波.嵌入式系统可信平台模块研究[J].计算机研究与发展,2011,48(7):1269-1278. 被引量:39
  • 9PARNO B, MCCUNE J M, PERRIG A. Bootstrapping trust in commodity computers[C]//2010 IEEE Symposium on Security and Privacy. Oakland, USA: IEEE, 2010: 414-429.
  • 10KHALID O, ROLFES C, IBING A. On implementing trusted boot for embedded systems[C]//2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). New York, USA: IEEE, 2013: 75-80.

二级参考文献47

共引文献93

同被引文献36

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部