期刊文献+

基于动态信任根的虚拟机监控器动态完整性度量架构

Dynamic integrity measurement architecture for virtual machine monitor based on dynamic root of trust
下载PDF
导出
摘要 现有虚拟机监控器(VMM)动态完整性度量架构在度量信任根的安全性方面存在问题,同时没有综合考虑VMM中需要进行完整性度量的数据,为此提出了一种基于动态信任根的VMM动态完整性度量架构。采用基于AMD的安全虚拟机技术构建动态信任根,可以实现对度量程序加载执行前的完整性度量;同时构建封闭独立的执行环境,从而可以有效地解决度量信任根的问题。通过分析VMM运行时的内存状态,对所有需要进行完整性保护的静态持久化数据进行完整性度量,从而可以保证度量内容的完备性。同时给出该架构在Xen上的实现。实验结果表明,该架构可以有效地解决度量信任根的问题,并且对度量内容具有良好的扩展性,从而保证度量内容的完备性;此外,该度量架构与现有架构Hyper Check-SMM相比有23.3%的性能提升。 There are problems in the existing Virtual Machine Monitor( VMM) dynamic integrity measurement architecture, such as the security of the root of trust for measurement, and not considering the data that needs to be used in the VMM for integrity measurement. A new architecture of dynamic integrity measurement architecture for VMM based on dynamic root of trust was presented in this paper. By using secure virtual machine to construct the dynamic root of trust for measurement based on AMD, it could realize the integrity measurement program before execution, and built a closed independent execution environment, which could effectively solve the problem of the root of trust for measurement. By analyzing the memory state of the runtime VMM, it could measure the integrity of all the static persistent data that needed to be protected for guaranteezing the completeness of measurement content. The architecture was implemented on Xen. The experimental results show that the architecture can effectively solve the problem of root of trust for measurement, while ensuring the extensibility of the measurement content to guarantee its completeness, in addition, the measurement architecture can achieve 23. 3%performance boost compared with Hyper Check-SMM.
出处 《计算机应用》 CSCD 北大核心 2014年第A02期194-199,共6页 journal of Computer Applications
基金 信息网络安全公安部重点实验室开放基金资助课题(C12610) 江西省教育厅青年科学基金资助项目(GJJ13013)
关键词 虚拟机监控器 完整性保护 可信计算 动态信任根 动态完整性度量 Virtual Machine Monitor (VMM) integrity protection trusted computing dynamic root of trust dynamic integrity measurement
  • 相关文献

参考文献15

  • 1National Institute of Standards and Technology. National vulnerabili- ty database [ EB/OL]. [ 2014-02-01]. http://nvd, hist. gov/. 被引量:1
  • 2SECUNIA. Vulnerability report: Xen 3. x [ EB/OL]. [2013-12-31]. http://secunia, com/advisories/product/15863/. 被引量:1
  • 3WOJTEZUK R. Subverting the Xen hypervisor [ EB/OL]. [ 2014- 02-01]. http://citeseerx, ist. psu. edu/viewdoc/download? doi = 10.1.1. 167. 5640&rep = repl &type = pdf. 被引量:1
  • 4HUND R, HOLZ T, FREILING F C. Return-oriented rootkits: by- passing kernel code integrity protection mechanisms [ C] // Proceed- ings of the 18th Conference on USENIX Security Symposium. Berk- erly: USENIX Association, 2009:383 -398. 被引量:1
  • 5CHEN S, XU J, SEZER E C, et al. Non-control-data attacks are realistic threats [ C] // Proceedings of the 14 th Conference on USE- NIX Security Symposium. Berkerly: USENIX Association, 2005, 14:177 - 192. 被引量:1
  • 6Trusted Computing Group. TPM PC Client TPM Interface Specifica- tion Version 1.3 [ S]. [ S. 1. ] : TPM, 2013. 被引量:1
  • 7沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:253
  • 8WANG J, STAVROU A, GHOSH A. HyperCheck: a hardware-as- sisted integrity monitor [ C]// Recent Advances in Intrusion Detec- tion. Berlin: Springer, 2010:158-177. 被引量:1
  • 9KAUER B . OSLO : improving the security of trusted computing [ C]// Proceedings of the 16 th Conference on USENIX Security Symposium. Berkerly: USENIX Association, 2007:229-237. 被引量:1
  • 10DING B, HE Y, WU Y, et al. HyperVerify: a VM-assisted archi- tecture for monitoring hypervisor non-control data [ C]// Proceed- ings of the 2013 IEEE 7 th International Conference on Software Se- curity and Reliability-Companion. Piscataway: IEEE, 2013:26 - 34. 被引量:1

二级参考文献109

共引文献288

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部