期刊文献+

一种基于TrustZone架构的主动可信度量机制设计 被引量:1

Design Of An Active Measurement Mechanism Based On The TrustZoneArchitecture
下载PDF
导出
摘要 为了保证安全关键的操作系统运行过程以及其运行结果是可信、可预期的,基于ARMTrustZone架构设计出一种主动可信度量机制,描述了在双世界架构下操作系统如何实施安全世界和非安全世界的可信度量交互,对操作系统整个运行周期中的度量对象做了梳理,并分别给出了系统引导时和运行时针对不同度量对象的度量策略。使得处于安全世界可信环境中的系统可主动的对非安全世界中的系统进行度量,及时发现问题,确保了操作系统以及运行其上的应用代码和数据的完整性,进一步保证了操作系统的安全性。 In order to guarantee security critical operating system’s operation and it’s running result is credible and predictable,based on ARM TrustZone architecture design an active trusted measurement mechanism,describes the operating system how to carry out trusted measurement interaction between secure world and unsecure world.Made a comb on the operating system of the wholeoperational cycle,and gives the different measurement strategy on different measure object in system boot time and runningtime.Makes the system in the secure world can take the initiative to measure the systemin unsecure world,find problems in time,ensure the integrity of the conde and data of the system and application which lie on it.Further ensure the security of the operating system.
作者 尹超 周霆 黄凡帆 Yin Chao;ZhouTing;Huang Fanfan(Xi'an Aeronautics Computing Technique Research Institute,AVIC,Xi'an710065,China)
机构地区 航空工业计算所
出处 《信息通信》 2020年第9期16-19,共4页 Information & Communications
基金 装备预研联合基金项目资助(6141B05060401)。
关键词 信息安全 TRUSTZONE 可信度量 度量策略 security TrustZone trusted measurement measurementstrategy
  • 相关文献

参考文献3

二级参考文献93

  • 1SADEGHI A R,STUBLE C. Property-based attestation for computing platforms: caring about properties, not mechanisms[ C] //Proceedings of the 2004 workshop on New security paradigms. New York: ACM , 2004: 67-77.
  • 2GEOFFREY S, MALCOLM D, SIGI G. TCG Infrastructure Working Group Architecture Part II- Integrity Management[ EB/OL]. ( 2006-11-17 ) [ 2009-06-10 ]. http: //www. trustedcomputinggroup, org/files/resource_files/87651761-1D09-3519- AD6C5B3E41547285/IWG_ArchitecturePartII_v1. O. pdf.
  • 3SAATY T L. The Analytic Hierarchy Process[ M]. New York: McGraw-Hill Book Company, 1980: 32-54.
  • 4MARCHESINI J, SMITH S W, WILD O, et al. How I Learned to Stop Worrying and Love the Bear. Techinial Report TR2003--476 [ EB/OL]. (2003-12-15) [ 2009-06-10 ]. http ://www-inst. eecs. berkeley, edu/- csl61/fa08/papers/tcg, pdf.
  • 5REINER S, ZHANG Xiao-lan, TRENT J, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture[ C]// Proceedings 13th USENIX Security Symposium. Berkerly: USENIX Association, 2004: 223-238.
  • 6TRENT J , REINER S, UMESH S. PRIMA: Policy-Reduced Integrity Measurement Architecture [ C ] //Proceedings of the l lth ACM Symposium on Access Control Models and Technologies. NewYork: ACM, 2006: 19-28.
  • 7KUHN U, SELHORST M, STUBLE C. Realizing property-based attestation and sealing with commonly available hard-and software[ C] // Proceedings of 2nd ACM Workshop on Scalable Trusted Computing. NewYork : ACM, 2007 : 50-57.
  • 8STEPHEN P M . Formalizing Trust as a Computational Concept[ D ]. UK:Department of Computing Science and Mathematics, University of Stifling, 1994: 19-80.
  • 9MUI L, MOHTASHEMI M, HALBERSTADT A. A computational model of trust and reputation for e-businesses [ C ] // Proceedings of the 35th Hawaii International Conference on System Science (HICSS). New York: IEEE, 2002:2431-2439.
  • 10BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[ C]// Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994: 3-18.

共引文献53

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部