期刊文献+

基于不可信Linux内核构建软件运行可信域的方法

The Method of Building A Trusted Software Running Domain Based on an Untrusted Linux Kernel
下载PDF
导出
摘要 在当今这个恶意软件泛滥和黑客日益猖獗的时代,软件运行环境面临比以往任何时候都要多的挑战。软件代码被逆向篡改,敏感数据被广泛访问等威胁无处不在。软件运行产生的数据能够被广泛读取,敏感数据得不到保护。构建一个可信空间运行应用程序以保护代码和数据成为一个迫切需求。应用程序运行是将操作系统内核作为可信基来调度硬件和系统服务,但是可信内核应用程序无法确定,大部分情况都是运行在不可信内核基础之上,因此如何基于不可信操作系统内核保护应用程序的安全成为安全领域热点问题之一。本文提出了一种基于不可信linux内核构建软件可信域的方法,包括了内核层可信基构建和软件代码加密保护、进程运行控制流保护、文件I/O保护这三个信任链的构建。通过这个方法构建软件运行可信域实现应用程序运行空间隔离、算力共享、业务开放三大可信运行环境关键属性,确保应用程序可信安全运行。 In today’s era of rampant malware and hacking,the software operating environment faces more challenges than ever before.Threats such as reverse tampering of software code and wide access to sensitive data are ubiquitous.The data generated by the operation of the software can be widely read,and sensitive data cannot be protected.Building a trusted space to run applications to protect code and data becomes an imperative.The application run will allow the operating system kernel as a credible base to schedule hardware and system services,but trusted kernel application can not be sure,most of the cases are run without credible kernel basis,so how to protect the application based on the credibility the operating system kernel security become one of hot issues in security market.This paper proposes a method to build a software trusted domain based on the untrusted Linux kernel,including kernel layer trust base construction and software code encryption protection,process running control flow protection,file I/O protection,these three trust chain construction.Building a software running trusted domain in this way can achieve the three key attributes of the trusted operating environment:application running space isolation,computing power sharing and business openness to ensure the trusted and safe operation of applications.
作者 胡志锋 李国胜 郑轶 郭金辉 王路路 Hu Zhifeng;Li Guosheng;Zheng Yi;Guo Jinhui;Wang Lulu(Elex Cybersecurity Inc.,Nanjing Jiangsu,21000)
出处 《工业信息安全》 2022年第3期44-53,共10页 Industry Information Security
关键词 LINUX内核 代码反编译 可信基 可信域 Linux Kernel Code Decompilation Trusted Basis Trusted Domain
  • 相关文献

参考文献4

二级参考文献77

  • 1何慧,江水,李立号,桑耘.基于TCM的国产化虚拟可信计算平台研究[J].计算机工程,2011,37(S1):63-66. 被引量:7
  • 2Dyer J Gv Lindemann M,Perez R,et al.Building the IBM4758 secure coprocessor[J].IEEE Computer,200l,34( 10) :57-66. 被引量:1
  • 3Lie D, Thekkath C, Mitchell M, et al.Architectural support for copy and tamper resistant software[C]//Proceedings of the 9th International Conference on Architectural Support for Pro?gramming Languages and Operating Systems, Cambridge, MA, USA,2000: 168-177. 被引量:1
  • 4Suh G, Clarke D, Gassend B ,et al.ARGIS: architecture for tamper?evident and tamper resistant processing[C]//Proceedings of the 17th International Conference on Supercomputing, San Fran?cisco, CA, USA,2003: 160-171. 被引量:1
  • 5Chen B, Morris T.Certifying program execution with secure processors[C]//Proceedings of the 9th Hot Topics in Operating Systems .Lihue .Hawaii , USA,2003, 9 :23-29. 被引量:1
  • 6Trusted Computing Group. TCG 1_4 architecture overview[EB/OL].[2012-10-0 I].http://www. Trustedcomputinggroup.org/files/resource_ files/ AC652DE II 09-3 519-ADA026AOC05CFAC2/TCG _1_ 4 Architecture_Overview. pdf. 被引量:1
  • 7Intel Corporation.Intel trusted execution technology software development guide[EB/OL].[2012-10-01].http://www.intel.com/ technology/security/down-Ioads/315168.htm. 被引量:1
  • 8Advanced Micro Devices.AMD64 virtualization: secure virtual machine architecture reference manual[M].[S.l.]: AMD Publi?cation, 2005-05. 被引量:1
  • 9Marchesini J, Smith S.SHEMP: secure hardware enhanced MyProxy[C]//Proceedings of 3rd Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 2005. 被引量:1
  • 10Trustedgrub[EB/OL].[2012-1 0-0 l].http://sourceforge.netlprojects/ trustedgrub. 被引量:1

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部