期刊文献+

一种移动可信平台ELF文件完整性校验方法 被引量:1

A VERIFICATION METHOD OF ELF FILES INTEGRITY IN MOBILE TRUSTED PLATFORM
下载PDF
导出
摘要 完整性校验通常对整个内容采用MD5等算法获得摘要。移动可信平台需要经常进行大量完整性校验,然而其各种资源却十分有限。提出了一种可以配合各种成熟的HASH算法使用的完整性校验方法——RMAC(Random-MAC)。从不同版本的Linux系统中,搜集了不同格式的ELF文件,随机抽取粒度样本,进行完整性校验分析。实验结果发现,在合适的抽取粒度下RMAC可以将效率提高一倍甚至更多。单次RMAC校验的安全性能在可接受范围内有所下降,但是由于其引入随机性,每次计算产生的摘要都不同,使目前已有的病毒都无法做到每次都能通过RMAC校验。RMAC提供的障碍有效地降低了病毒的繁殖速度,可以阻止病毒的大规模爆发。 Integrity checks are typically performed on the entire content using algorithms such as MD5. Mobile Trusted Platforms often require extensive integrity checks, but their resources are limited. We propose an integrity checking method RMAC (Random-MAC), which can be used with various mature HASH algorithms. ELF files of different formats were collected from different versions of Linux systems. Furthermore, random samples of granularity were taken for completeness verification analysis. The experimental results show that RMAC can double or even more efficiently at the appropriate extraction granularity. The security performance of a single RMAC check is degraded in the acceptable range. However, due to the randomness of the RMAC check, the summary of each calculation is different, so that the existing virus can't be done every time through the RMAC Inspection. The barriers provided by RMAC effectively reduce the rate of virus propagation and prevent large-scale virus outbreaks.
作者 张永棠 ZHANG Yong-tang(Department of computer science and technology, Guangdong Neusofl Institute, Foshan, Guangdong 528225, China Jiangxi Microsoft Technology Center, Nanchang, Jiangxi 330003, China)
出处 《井冈山大学学报(自然科学版)》 2017年第2期55-60,共6页 Journal of Jinggangshan University (Natural Science)
基金 广东省普通高校特色创新项目(2014KTSCX212) 江西省教育厅科学技术研究项目(GJJ13355)
关键词 可信 ELF 可执行文件 完整性校验 trusted computing ELF executable file integrity measurement
  • 相关文献

参考文献3

二级参考文献28

  • 1钱海川.手机安全风险防范[J].软件世界,2006(2):73-73. 被引量:3
  • 2李志,王延巍,朱林.手机病毒的现状与未来[J].电信技术,2006(3):87-90. 被引量:16
  • 3郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 4[3]王江民.计算机病毒的发展趋势及KV3000的反病毒对策[EB/OL].http://my.poco.cn/myBlogDetailhtx-id-s6088-userid-707428-pri--n-0.shtml,2007-05-01.
  • 5TCG. TCG Mobile Trusted Module Specification[S]. TCG. 2010.
  • 6Zhang Xin-wen, Aclicmez O, Seifert J-P. A trusted mobile phone reference architecture via secure kernel[C]//Proceedings of the 2007 ACM workshop on Scalable trusted computing. ACM: Al- exandria, Virginia, USA, 2007 : 7-14.
  • 7Winter J. Trusted computing building blocks for embedded li- nux-based ARM trustzone platforms[C] // Proceedings of the 3rd ACM workshop on Scalable trusted computing. ACMt Alex- andria, Virginia, USA, 2008: 21-30.
  • 8Dietrich K, Winter J. Implementation Aspects of Mobile and Em- bedded Trusted Computing[C]//Proceedings of the 2nd Inter- national Conference on Trusted Computing. Oxford, UK: Springer-Verlag, 2009 : 29-44.
  • 9Dietrich K. An integrated architecture for trusted computing for java enabled embedded devices[C]// Proceedings of the 2007ACM workshop on Scalable trusted computing. ACM: Alexan- dria , Virginia, USA, 2 0 0 7 : 2-6.
  • 10Dietrich K. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation [C]//Proceedings of INTRUST 2009,2010. Oxford, UK: Springer-Verlag, 2010 : 88-103.

共引文献24

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部