期刊文献+

基于TrustZone的开放环境中敏感应用防护方案 被引量:5

A TrustZone Based Application Protection Scheme in Highly Open Scenarios
下载PDF
导出
摘要 针对BYOD(bring your own device)、移动云计算等兼具强安全性、高开放性需求的新型应用场景,提出了一种移动嵌入式平台敏感应用防护方案.为满足强安全性需求,方案基于ARM TrustZone硬件隔离技术构建可信执行环境,即使在整个操作系统内核被攻破的情况下仍能保证敏感应用的安全.为满足高开放性需求,方案实现了传统TrustZone安全方案不具备的两大优势.首先,将TrustZone保护域扩展至普通世界,安全世界不再实现具体的敏感应用,而只实现一个轻量级监控模块用以监控普通世界内核的行为.因此整个系统可信计算基不随敏感应用数量的增加而增大,减少了其可攻击面和潜在漏洞。其次,监控模块确保内核为这些敏感应用提供安全的系统服务,从而为满足开放性需求提供关键功能支持,例如提供标准系统调用接口、敏感应用动态部署和加载等.最后,方案提出了内核主动证明机制,要求内核主动提供关键信息协助监控模块验证其自身行为,有效提高了系统运行效率.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率. We propose a protection scheme for security-sensitive applications on mobile embedded devices,which is focus on the scenarios with both strong security and high openness requirements,such as 'bring your own device',mobile cloud computing.To meet the security requirements,we leverage the trusted execution environment of ARM TrustZone to provide strong isolation guarantees for applications even in the presence of a malicious operating system.To meet the openness requirements,our scheme has two major advantages compared with previous TrustZone-based solutions.Firstly,it moves concrete sensitive applications from TrustZone secure world to the normal world,so that the trusted computing base keeps small and unchanged regardless of the amount of supported security applications.Secondly,it leverages a light-weight kernel monitor in the secure world to enforce the untrusted operating system to serve these security applications legally,so that they could securely use standard system calls,which could provide critical features for the openness requirements,such as dynamic application deployment.We also propose proactive attestation,a novel technique that greatly improves the system efficiency by enforcing the operating system to contribute to its own verification. We implement the prototype system on real TrustZone devices.The experiment results show that our scheme is practical with acceptable performance overhead.
出处 《计算机研究与发展》 EI CSCD 北大核心 2017年第10期2268-2283,共16页 Journal of Computer Research and Development
基金 国家自然科学基金项目(91118006 61402455 61602455)~~
关键词 TRUSTZONE 可信执行环境 敏感应用防护 内核监控 内核主动证明 TrustZone trusted execution environment sensitive application protection kernel monitor kernel proactive attestation
  • 相关文献

参考文献1

二级参考文献20

  • 1Bejtlich R. Understanding the advanced persistent threat[EB/OL]. [ 2015-06-15]. http://searchsecurity, techtarget. com. html.
  • 2Krebs B. Crimepack: Packed with hard lessons [EB/OL]. [2015-06-15]. http://krebsonsecurity, com/2010/081crimepack- packedwit h-hard-lessons.
  • 3Bitg+Carbon Black. The bit9 security platformv7 [EB/OL]. [2015-06-15]. https://www, bitg. eomldownload]data-sheets] Bit9-Securit y-Plat formvT, pdf.
  • 4Shaffer R. Raising the white flag: Bypassing application whitelisting [EB/OL]. [2015-06-15]. http://foregroundsecurity. com/rcsources/blog.
  • 5Cristoph H. Bypassing PatchGuard 3 [EB/OL]. [2015-06- 15]. http://www, codeproiect, comlArticles128318/Bypassing- PatchGuard.
  • 6Saile R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture [C] //Proe of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.
  • 7ARM. Building a secure system using TrustZone [EB/OL]. [2015-06-15]. http://www, arm. com.
  • 8Petroni N L, Fraser T, Molina J, et al. Copilota coprocessor-based kernel runtime integrity monitor [C] // Proc of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.
  • 9Seshadri A, Luk M, Perrig A. Secvisor: A tiny hypervisor to provide etime kernel code integrity for commodity oses [J]. ACM SIGOPS Operating Systems Review, 2007, 41 (6): 335-350.
  • 10Ge X, Vijayakumar H, Jaeger T. SPROBES: Enforcing kernel code integrity on the trustzone architecture [C] //Proc of the Mobile Security Technologies (MOST) Workshop. Piseataway, NJ: IEEE, 2014.

共引文献20

同被引文献33

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部