期刊文献+

一种基于局部性原理的远程验证机制

Remote Attestation Mechanism Based on Locality Principle
下载PDF
导出
摘要 为了提高嵌入式平台配置远程证明方案的效率,在基于Merkle哈希树存储结构的基础上,结合程序的局部性原理,考虑平台下程序验证的时间特性,对存储程序模块完整性度量值的数据结构进行了改进,提出了一种基于局部性原理的远程验证机制。实验分析表明,新的机制可以减少构造存储度量日志的时间消耗,缩短应用程序实时认证路径的长度,提高平台配置远程证明的验证效率。 In order to improve the efficiency of the remote configuration attestation scheme,combining the locality principle of the program with the storage structure of Merkle Hash tree,the data structure used to store the Hash values of the program module integrity was improved,and a remote proof mechanism based on locality principle was proposed.Experiments show that the new mechanism can improve the efficiency of the remote configuration attestation by redu-cing the consumption of constructing stored measurement logs and shortening the length of authentication paths.
作者 夏庆勋 庄毅 XIA Qing-xun;ZHUANG Yi(College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
出处 《计算机科学》 CSCD 北大核心 2018年第4期148-151,162,共5页 Computer Science
基金 国家自然科学基金(61572253) 航空科学基金(2016ZC52030)资助
关键词 可信计算 远程证明 Merkle哈希树 局部性原理 Trusted computing Remote attestation Merkle Hash tree Locality principle
  • 相关文献

参考文献4

二级参考文献34

  • 1SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 2Peter Ferrie. Attacks on virtual machine emulators [R]. Tech. rep.Symantec Security Response, 2006.
  • 3Tal Garfinkek, Ben Pfaff, Jim Chow. Mendel Rosenblum and Dan Boneh.Terra: a virtual machine-based platform for trusted computing[C]. SOSP03: Proceedings of 19th ACM Symposium on Operating Systems Principles. New York, NY, US, ACM, 2003, 193-206.
  • 4Rafal Wojtcauk. Subverting the Xen hypervisor[EB/OL]. [2008]. http: //invisiblethingslab.com/bh08/ papers/part 1 -subverting_xen.pdf.
  • 5Intel. Intel trusted execution technology measured launched environment developer' s guide[EB/OL]. [2008]. http: //download.intel.com/technology/security/downloads/ 315168.pdf.
  • 6Yuriy Bulygin and David Samyde. Chipset based approach to detect virtualization malware a.k.a. DeepWatch[EB/OL]. Black Hat USA. [2008]. http: / /www.mnm-team.org/pub/Fopras/frit08/PDF-Version/frit08.pdf.
  • 7Trusted Computing Group. TCG specification architecture overview revision 1.4. 2007. http://www.trustedcomputinggroup.org/.
  • 8Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3. 2007. http://www. trustedeomputinggroup.org/.
  • 9Sailer R, Zhang XL, Jaeger T, van Doom L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004. 223-238.
  • 10Jaeger T, Salter R, Shankar U. PRIMA: Policy-Reduced integrity measurement architecture. In: Ferraiolo D, et al., eds. Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2006. 19-28.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部