期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
A Behavior-Based Remote Trust Attestation Model 被引量:10
1
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
2
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
下载PDF
SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications
3
作者 Nasa Ahmed Manar Abu Talib Qassim Nasir 《Computers, Materials & Continua》 SCIE EI 2021年第4期23-49,共27页
Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platf... Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platform’s integrity.Several software-based attestation mechanisms have been proposed,but none of them can detect runtime attacks.Although some researchers have attempted to tackle these attacks,the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim.These solutions are expensive and not suitable in many cases.This paper proposes a dual attestation process,SAPEM,with two phases:static and dynamic.The static attestation phase examines the program memory of the attested device.The dynamic program ow attestation examines the execution correctness of the application code.It can detect code injection and runtime attacks that hijack the control-ow,including data attacks that affect the program control-ow.The main aim is to minimize attestation overhead while maintaining our ability to detect the specied attacks.We validated SAPEM by implementing it on Raspberry Pi using its TrustZone extension.We attested it against the specied attacks and compared its performance with the related work in the literature.The results show that SAPEM signicantly minimizes performance overhead while reliably detecting runtime attacks at the binary level. 展开更多
关键词 IOT remote attestation runtime attacks TRUST TRUSTZONE security
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
4
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
Trusted Attestation Architecture on an Infrastructure-as-a-Service 被引量:4
5
作者 Xin Jin Xingshu Chen +1 位作者 Cheng Zhao Dandan Zhao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期469-477,共9页
Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (laaS) platform is ... Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (laaS) platform is a problem that must be solved. The laaS platform provides the Virtual Machine (VM), and the Trusted VM, equipped with a virtual Trusted Platform Module (vTPM), is the foundation of the trusted laaS platform. We propose a multi-dimensional trusted attestation architecture that can collect and verify trusted attestation information from the computing nodes, and manage the information centrally on a cloud management platform. The architecture verifies the laaS's trusted attestation by apprising the VM, Hypervisor, and host Operating System's (OS) trusted status. The theory and the technology roadmap were introduced, and the key technologies were analyzed. The key technologies include dynamic measurement of the Hypervisor at the process level, the protection of vTPM instances, the reinforcement of Hypervisor security, and the verification of the laaS trusted attestation. A prototype was deployed to verify the feasibility of the system. The advantages of the prototype system were compared with the Open CIT (Intel Cloud attestation solution). A performance analysis experiment was performed on computing nodes and the results show that the performance loss is within an acceptable range. 展开更多
关键词 dynamic measurement trusted cloud vTPM trusted attestation
原文传递
TPM-Based Remote Attestation for Wireless Sensor Networks 被引量:4
6
作者 Donglai Fu Xinguang Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期312-321,共10页
It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission- critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the t... It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission- critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the trustworthiness without appropriate hardware support. Hence, we present a hardware-based remote attestation protocol to tackle the problem within WSNs. In our design, each sensor node is equipped with a Trusted Platform Module (TPM) which plays the role of a trusted anchor. We start with the formulation of remote attestation and its security. The complete protocol for both single-hop and multi-hop attestations is then demonstrated. Results show the new protocol is effective, efficient, and secure. 展开更多
关键词 network security wireless sensor networks remote attestation trusted platform module
原文传递
A New Process and Framework for Direct Anonymous Attestation Based on Symmetric Bilinear Maps 被引量:1
7
作者 TAN Liang1,2, ZHOU Mingtian3 1. College of Computer/Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan, Sichuan Normal University, Chengdu 610066, Sichuan, China 2. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China 3. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, Sichuan, China 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期369-375,共7页
For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solutio... For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solution to ECC-based TPM in protecting the privacy of the TPM. The scheme still includes five procedures or algorithms: Setup, Join, Sign, Verify and Rogue tagging, but gets rid of zero-knowledge proof and takes on a new process and framework, of which the main operations are addition, scalar multiplication and bilinear maps on supersingular elliptic curve systems. Moreover, the scheme adequately utilizes the properties of bilinear maps as well as the signature and verification of the ecliptic curve system itself. Compared with other schemes, the new DAA scheme not only satis- fies the same properties, and shows better simplicity and high effi- ciency. This paper gives not only a detailed security proof of the proposed scheme, but also a careful performance analysis by comparing with the existing DAA schemes. 展开更多
关键词 direct anonymous attestation bilinear map PRIVACY AUTHENTICATION trusted computing platform trusted platform module
原文传递
Trust Attestation Mechanism for the Sensing Layer Nodes of Internet of Things 被引量:1
8
作者 WANG Yubo GONG Bei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期337-345,共9页
The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data sourc... The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data source.To solve the above problems,a trust attestation mechanism for sensing layer nodes is presented.First a trusted group is established,and the node which is going to join the group needs to attest its identity and key attributes to the higher level node.Then the dynamic trust measurement value of the node can be obtained by measuring the node data transmission behavior.Finally the node encapsulates the key attributes and trust measurement value to use short message group signature to attest its trust to the challenger.This mechanism can measure the data sending and receiving behaviors of sensing nodes and track the data source,and it does not expose the privacy information of nodes and the sensing nodes can be traced effectively.The trust measurement for sensing nodes and verification is applicable to Internet of Things and the simulation experiment shows the trust attestation mechanism is flexible,practical and efficient.Besides,it can accurately and quickly identify the malicious nodes at the same time.The impact on the system performance is negligible. 展开更多
关键词 Internet of Things source of data trust measurement trust attestation
原文传递
Remote Attestation-Based Access Control on Trusted Computing Platform
9
作者 LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期190-194,共5页
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller (RABAC), which is based on a combination of techniques, such as random number, Bell-La Padula (BLP) model, user identity combined with his security properties and so on. The component can validate the current hardware and software integrity of the remote platform, and implement access control with different security policy. We prove that the RABAC can not only improve the security of transferred information in remote attestation process but also integrate remote attestation and classical system security mechanism effectively. 展开更多
关键词 trusted computing remote attestation access control security model
原文传递
Voluntary disclosure of internal control and auditor's attestation: evidence from China
10
作者 Fang Lou Qian Sun Hongqi Yuan 《Frontiers of Business Research in China》 2017年第2期208-241,共34页
We examine what determines a firm's decision to disclose a self-assessment report on its internal control (IC) system and to further attain an auditor's attestation on the report, using a sample of firms from the ... We examine what determines a firm's decision to disclose a self-assessment report on its internal control (IC) system and to further attain an auditor's attestation on the report, using a sample of firms from the Shanghai Stock Exchange during the period 2006-2010. We hypothesize and find supporting evidence that the likelihood of having voluntary disclosure of IC self-assessment with an auditor's attestation is positively related to future equity refinancing, mutuM-fund shareholding, and whether the firm is controlled by the government, especially the central government. Our study also takes the identification problem into consideration, as our sample includes firms with IC weaknesses/deficiencies. Our study not only makes an incremental contribution to the literature, but also has practical implications, especially for regulators and investors in China. 展开更多
关键词 Internal control Voluntary disclosure Auditor's attestation SELF-ASSESSMENT
原文传递
PIMS:An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context
11
作者 Miaomiao Yang Guosheng Huang +3 位作者 Junwei Liu Yanshuang Gui Qixu Wang Xingshu Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1879-1898,共20页
With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,mal... With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,malware attacks such as Doki and Symbiote threaten the container runtime’s security.Malware initiates various types of runtime anomalies based on process form(e.g.,modifying the process of a container,and opening the external ports).Fortunately,dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime.Nevertheless,the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.As a result,the existing dynamicmonitoringmechanismis still not practical enough.To ensure the trustworthiness of the baseline value data and,simultaneously,to achieve the integrity verification of the monitored process,we combine blockchain and trusted computing to propose a process integrity monitoring system named IPMS.Firstly,the hardware TPM 2.0 module is applied to construct a trusted security foundation for the integrity of the process code segment due to its tamper-proof feature.Then,design a new format for storing measurement logs,easily distinguishing files with the same name in different containers from log information.Meanwhile,the baseline value data is stored on the blockchain to avoidmalicious damage.Finally,trusted computing technology is used to perform fine-grained integrity measurement and remote attestation of processes in a container,detect abnormal containers in time and control them.We have implemented a prototype system and performed extensive simulation experiments to test and analyze the functionality and performance of the PIMS.Experimental results show that PIMS can accurately and efficiently detect tampered processes with only 3.57% performance loss to the container. 展开更多
关键词 Blockchain-based protection dynamic monitoring remote attestation integrity verification
下载PDF
Efficient and Secure Multi-Signature Scheme Based on Trusted Computing 被引量:1
12
作者 HAO Liming YANG Shutang +1 位作者 LU Songnian CHEN Gongliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期180-184,共5页
A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer... A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer's privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new signers are allowed to join the signature without modifying the public key, and attacks caused by secret key dumping or leaking can be avoided. 展开更多
关键词 MULTI-SIGNATURE trusted computing (TC) direct anonymous attestation (DAA) dynamic anonymity
下载PDF
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace 被引量:2
13
作者 Hui Lin Gyungho Lee 《Journal of Information Security》 2010年第1期1-10,共10页
Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, ne... Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, nearly all integrity measurement mechanism suffers from the fact that what is measured may not be same as what is executed. To solve this problem, a novel integrity measurement called dynamic instruction trace measurement (DiT) is proposed. For DiT, processor’s instruction cache is modified to stores back instructions to memory. Consequently, it is designed as a assistance to existing integrity measurement by including dynamic instructions trace. We have simulated DiT in a full-fledged system emulator with level-1 cache modified. It can successfully update records at the moment the attestation is required. Overhead in terms of circuit area, power consumption, and access time, is less than 3% for most criterions. And system only introduces less than 2% performance overhead in average. 展开更多
关键词 INTEGRITY Measurement Remote attestation Software VULNERABILITY TRUSTED Computing
下载PDF
Trusted Heartbeat Framework for Cloud Computing 被引量:1
14
作者 Dipen Contractor Dhiren Patel Shreya Patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 Trusted Heartbeat Cloud Computing Hadoop Framework REPUTATION attestation
下载PDF
Anonymous authentication scheme of trusted mobile terminal under mobile Internet 被引量:4
15
作者 ZHANG De-dong MA Zhao-feng +1 位作者 NIU Xin-xin Peng Yong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第1期58-65,共8页
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestatio... In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestation of trusted computing and uses the encrypting transfer and signature validation for its implementation. Aiming at two access mode of trusted mobile terminal under mobile Internet, self access and cross-domain access, the authentication process of each mode is described in details. The analysis shows that the scheme implements anonymous authentication on mobile Internet and is correct, controllable and unforgeable. 展开更多
关键词 trusted platform module anonymous authentication strong RSA assumption remote attestation
原文传递
Artifacts Attest to the Glorious Ancient Culture of Hunan Province
16
作者 JANE SHAW 《Women of China》 1995年第1期45-46,共2页
HUNAN is located in the middle reaches of the Yangtze River and to the south of Dongting Lake. In Chinese, hu means lake and nan, south. The Xiangjiang River valley, which flows through the province from south to nort... HUNAN is located in the middle reaches of the Yangtze River and to the south of Dongting Lake. In Chinese, hu means lake and nan, south. The Xiangjiang River valley, which flows through the province from south to north, is the most developed region in the areas of politics, the economy and culture. Thus, Hunan is also called Xiang for short. 展开更多
关键词 In Artifacts Attest to the Glorious Ancient Culture of Hunan Province
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部