期刊文献+

基于ATX主板的TPCM主动度量及电源控制设计 被引量:9

The TPCM Active Measurement and Power Control Design for ATX Motherboard
下载PDF
导出
摘要 文章提出一种基于ATX主板的可信平台控制模块(TPCM)主动度量及电源控制实现方法。该方法在保持主板原有设计的基础上,利用计算机主板已有的接口进行扩展设计,达到从第一条CPU指令开始的启动代码防篡改和防攻击的目的。结合电源控制的实现,该方法可以从根本上解决计算机启动源头代码不可信问题。该方法确保可信平台控制模块首先上电,主导计算机电源控制系统,度量启动代码的可信性和完整性。若检测到BIOS等固件信息被恶意篡改,则根据预先写在可信平台控制模块内部的安全策略进入非可信工作模式或阻止计算机上电。利用该方法设计的可信平台控制模块对计算机有主动的、绝对的控制权。极端情况下,一旦恶意代码入侵而导致系统失控的情况发生,可信平台控制模块可以采取关闭计算机、切断电源等绝对性保护措施。该方法不但可靠有效,而且实现成本低廉,安装简单。 This paper proposes an active measurement and control method of the trusted platform control module ( TPCM) based on advanced technology extended ( ATX) motherboard. Keeping the original design of the motherboard unchanged, the existing interfaces of the computer motherboard are extended to protect the boot code from been tampered and attacked from the first CPU instruction.Combined with the realization of the power control, the method can fundamentally solve the problem that the source of the boot is not to be trusted. This design makes sure the TPCM has been powered on firstly and lets the TPCM lead the power control system of the computer, measuring the credibility and the integrity of the boot code. If the BIOS and any other firmware have been maliciously tampered, the TPCM enter untrusted operation environment or prevent the computer from been powered on according to the pre written security policy in TPCM. The TPCM designed by this method has active and absolute control right on the computer. Once the malicious code invades and the system is out of control, the TPCM can take the absolute protection measures such as taking off the computer and cutting off the power. The method is not only reliable and effective, but also has the advantages of low cost and simple installation.
出处 《信息网络安全》 2016年第11期1-5,共5页 Netinfo Security
基金 国家自然科学基金[61472429]
关键词 ATX 可信平台控制模块 SPI BIOS 启动代码度量 ATX TPCM SPI BIOS boot code measurement
  • 相关文献

参考文献4

二级参考文献33

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:248
  • 2黄强,沈昌祥.可信计算技术对操作系统的安全服务支持[J].武汉大学学报(理学版),2004,50(A01):15-18. 被引量:3
  • 3王东霞,赵刚.安全体系结构与安全标准体系[J].计算机工程与应用,2005,41(8):149-152. 被引量:11
  • 4Trusted Computing Group. TCG Specification Architecture Overview[ EB/OL]. http ://www. trust edcomputinggroup, org/groups/TCG 1 2 Architec ture Overview. pdf, 2007
  • 5Trusted Computing Group. TPM Specification Version 1. 2. Part 1 Design Principles[EB/OL].http ://www. trustedcomputinggroup.org/specs/ TPM/Main_Part1_rev94. zip, 2007
  • 6Trusted Computing Group. TPM Specification Version 1.2. Part 2 TPM Structures[EB/OL]. http:// www. trustedcomputinggreup. org/specs/TPM/ Main_Part2_rev94. zip, 2007
  • 7Trusted Computing Group. TPM Specification Version 1. 2. Part 3 TPM Commands[EB/OL]. http ://www. trustedcomputinggroup.org/spees/ TPM/Main Part3_rev94. zip,2007
  • 8Danilo B, Lorenzo C, Andrea L. Replay Attack in TCG Specification and Solution. The 21 st Annual Computer Security Application Conference [C].Tucson, AZ, USA, 2005
  • 9Catherine Flick,Controversy over Trusted Computing[OL], http://luddite. est. usyd. edu. au/- liedra/misc/Controversy_ Over_ Trusted _ Computing. pdf, 2004
  • 10Trusted Computing Group. TPM Main Specification Version 1.2, Part 1 Design Principles[EB/OL]. https://www.trustedcomputinggroup.org/ resources/tpm_main_specification. 2007.

共引文献40

同被引文献41

引证文献9

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部