期刊文献+
共找到119篇文章
< 1 2 6 >
每页显示 20 50 100
一种基于区块链的可信电子商务身份认证系统 被引量:9
1
作者 周亮 应欢 +1 位作者 戴波 邱意民 《计算机应用与软件》 北大核心 2019年第11期322-328,333,共8页
传统的身份认证系统普遍面临中心不可信的安全风险,尤其是在电子商务的环境下,不可信认证会造成巨额的经济损失.针对这一问题,提出一种基于区块链的可信电子商务身份认证系统.为了解决中心化带来的单点故障问题,引入区块链技术,构建分... 传统的身份认证系统普遍面临中心不可信的安全风险,尤其是在电子商务的环境下,不可信认证会造成巨额的经济损失.针对这一问题,提出一种基于区块链的可信电子商务身份认证系统.为了解决中心化带来的单点故障问题,引入区块链技术,构建分布式的身份管理系统.为了降低密钥管理的中心化风险,引入无证书的密码体制,克服密钥托管问题,简化身份认证过程,增强身份认证的安全性.为了增强认证过程的计算安全,引入可信执行技术,构建基于硬件保护的高安全的身份验证环境.实验结果表明,该方案安全高效,具备良好的可行性. 展开更多
关键词 身份认证 区块链 无证书签密 可信执行
下载PDF
ETS-TEE: An Energy-Efficient Task Scheduling Strategy in a Mobile Trusted Computing Environment 被引量:2
2
作者 Hai Wang Lu Cai +2 位作者 Xuan Hao Jie Ren Yuhui Ma 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期105-116,共12页
A trusted execution environment(TEE)is a system-on-chip and CPU system with a wide security solution available on today’s Arm application(APP)processors,which dominate the smartphone market.Generally,mobile APPs crea... A trusted execution environment(TEE)is a system-on-chip and CPU system with a wide security solution available on today’s Arm application(APP)processors,which dominate the smartphone market.Generally,mobile APPs create a trusted application(TA)in the TEE to process sensitive information,such as payment or message encryption,which is transparent to the APPs running in the rich execution environments(REEs).In detail,the REE and TEE interact and eventually send back the results to the APP in the REE through the interface provided by the TA.Such an operation definitely increases the overhead of mobile APPs.In this paper,we first present a comprehensive analysis of the performance of open-source TEE encrypted text.We then propose a high energy-efficient task scheduling strategy(ETS-TEE).By leveraging the deep learning algorithm,our policy considers the complexity of TA tasks,which are dynamically scheduled between modeling on the local device and offloading to an edge server.We evaluate our approach on Raspberry Pi 3B as the local mobile device and Jetson TX2 as the edge server.The results show that compared with the default scheduling strategy on the local device,our approach achieves an average of 38.0%energy reduction and 1.6×speedup.This greatly reduces the performance loss caused by mobile devices in order to protect the safe execution of applications,so that the trusted execution environment has both security and high performance. 展开更多
关键词 trusted execution environment mobile system task scheduling strategy optimization of energy efficiency
原文传递
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android
3
作者 Thien-Phuc Doan Ngoc-Tu Chau +1 位作者 Jungsoo Park Souhwan Jung 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3059-3073,共15页
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s... Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security. 展开更多
关键词 Mobile security trusted execution model virtualized trusted execution environment HYPERVISOR
下载PDF
Confidential computing and related technologies:a critical review
4
作者 Muhammad Usama Sardar Christof Fetzer 《Cybersecurity》 EI CSCD 2023年第4期26-32,共7页
This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the defi... This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future. 展开更多
关键词 Confidential Computing(CC) trusted execution Environment(TEE) Homomorphic Encryption(HE) trusted Platform Module(TPM) Formal methods
原文传递
基于安全协处理器保护软件可信运行框架 被引量:4
5
作者 魏强 金然 +1 位作者 寇晓蕤 王清贤 《计算机工程与设计》 CSCD 北大核心 2008年第15期3846-3848,共3页
软件可信运行是许多应用领域的基础,但恶意主机问题使得很难保证一个软件可信运行。在传统的基于硬件加密平台保护软件可信运行机制中,运行于安全硬件中的代码和运行于主机中的代码不在同一个执行上下文中,因此难以给用户提供完善的保... 软件可信运行是许多应用领域的基础,但恶意主机问题使得很难保证一个软件可信运行。在传统的基于硬件加密平台保护软件可信运行机制中,运行于安全硬件中的代码和运行于主机中的代码不在同一个执行上下文中,因此难以给用户提供完善的保护策略。为此,提出了一种新的基于安全协处理器保护软件可信运行的框架,在该框架下,软件设计者可以根据待保护软件特点和自身要求定制更加完善和灵活的保护。 展开更多
关键词 安全协处理器 可信运行 软件保护 恶意主机问题 可信计算
下载PDF
An OP-TEE Energy-Efficient Task Scheduling Approach Based on Mobile Application Characteristics
6
作者 Hai Wang Xuan Hao +3 位作者 Shuo Ji Jie Zheng Yuhui Ma Jianfeng Yang 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1621-1635,共15页
Trusted Execution Environment(TEE)is an important part of the security architecture of modern mobile devices,but its secure interaction process brings extra computing burden to mobile devices.This paper takes open por... Trusted Execution Environment(TEE)is an important part of the security architecture of modern mobile devices,but its secure interaction process brings extra computing burden to mobile devices.This paper takes open portable trusted execution environment(OP-TEE)as the research object and deploys it to Raspberry Pi 3B,designs and implements a benchmark for OP-TEE,and analyzes its program characteristics.Furthermore,the application execution time,energy consumption and energy-delay product(EDP)are taken as the optimization objectives,and the central processing unit(CPU)frequency scheduling strategy of mobile devices is dynamically adjusted according to the characteristics of different applications through the combined model.The experimental result shows that compared with the default strategy,the scheduling method proposed in this paper saves 21.18%on average with the Line Regression-Decision Tree scheduling model with the shortest delay as the optimization objective.The Decision Tree-Support Vector Regression(SVR)scheduling model,which takes the lowest energy consumption as the optimization goal,saves 22%energy on average.The Decision Tree-K-Nearest Neighbor(KNN)scheduling model with the lowest EDP as the optimization objective optimizes about 33.9%on average. 展开更多
关键词 trusted execution environment energy efficiency optimization CPU scheduling governor machine learning
下载PDF
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures 被引量:2
7
作者 Jin-Yu Gu Hao Li +3 位作者 Yu-Bin Xia Hai-Bo Chen Cheng-Gang Qin Zheng-Yu He 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第2期468-486,共19页
ion and secure enclave migration on heterogeneous security architectures.
关键词 heterogeneous trusted execution environment(TEE) enclave abstraction enclave migration
原文传递
A survey of Intel SGX and its applications 被引量:3
8
作者 Wei ZHENG Ying WU +4 位作者 Xiaoxue WU Chen FENG Yulei SUI Xiapu LUO Yajin ZHOU 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第3期191-205,共15页
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its applications.With the advent of SGX in 2013 and its subsequent development,the corresponding rese... This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its applications.With the advent of SGX in 2013 and its subsequent development,the corresponding research works are also increasing rapidly.In order to get a more comprehensive literature review related to SGX,we have made a systematic analysis of the related papers in this area.We first search through five large-scale paper retrieval libraries by keywords(i.e.,ACM Digital Library,IEEE/IET Electronic Library,SpringerLink,Web of Science,and Elsevier Science Direct).We read and analyze a total of 128 SGX-related papers.The first round of extensive study is conducted to classify them.The second round of intensive study is carried out to complete a comprehensive analysis of the paper from various aspects.We start with the working environment of SGX and make a conclusive summary of trusted execution environment(TEE).We then focus on the applications of SGX.We also review and study multifarious attack methods to SGX framework and some recent security improvements made on SGX.Finally,we summarize the advantages and disadvantages of SGX with some future research opportunities.We hope this review could help the existing and future research works on SGX and its application for both developers and users. 展开更多
关键词 Intel SGX cloud computing trusted execution environment trustZONE AMD SEV
原文传递
On Monetizing Personal Wearable Devices Data:A Blockchain-based Marketplace for Data Crowdsourcing and Federated Machine Learning in Healthcare
9
作者 Mohamed Emish Hari Kishore Chaparala +1 位作者 Zeyad Kelani Sean D.Young 《Artificial Intelligence Advances》 2022年第2期8-16,共9页
Machine learning advancements in healthcare have made data collected through smartphones and wearable devices a vital source of public health and medical insights.While wearable device data help to monitor,detect,and ... Machine learning advancements in healthcare have made data collected through smartphones and wearable devices a vital source of public health and medical insights.While wearable device data help to monitor,detect,and predict diseases and health conditions,some data owners hesitate to share such sensitive data with companies or researchers due to privacy concerns.Moreover,wearable devices have been recently available as commercial products;thus large,diverse,and representative datasets are not available to most researchers.In this article,the authors propose an open marketplace where wearable device users securely monetize their wearable device records by sharing data with consumers(e.g.,researchers)to make wearable device data more available to healthcare researchers.To secure the data transactions in a privacy-preserving manner,the authors use a decentralized approach using Blockchain and Non-Fungible Tokens(NFTs).To ensure data originality and integrity with secure validation,the marketplace uses Trusted Execution Environments(TEE)in wearable devices to verify the correctness of health data.The marketplace also allows researchers to train models using Federated Learning with a TEE-backed secure aggregation of data users may not be willing to share.To ensure user participation,we model incentive mechanisms for the Federated Learning-based and anonymized data-sharing approaches using NFTs.The authors also propose using payment channels and batching to reduce smart contact gas fees and optimize user profits.If widely adopted,it’s believed that TEE and Blockchain-based incentives will promote the ethical use of machine learning with validated wearable device data in healthcare and improve user participation due to incentives. 展开更多
关键词 Wearable devices Data integrity Data validation Federated learning Blockchain trusted execution environment Health informatics Healthcare data collection Data monetization
下载PDF
Security Protection Method of Energy Internet with Android
10
作者 ZHU Yayun JIANG Lin +1 位作者 YUAN Anqi YUAN Yinghao 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期11-16,共6页
As a product of the combination of information and energy technology,the energy internet is enormous and complex,and the absence of security safeguards at any aspect of it can cause incalculable damage.Aiming at the p... As a product of the combination of information and energy technology,the energy internet is enormous and complex,and the absence of security safeguards at any aspect of it can cause incalculable damage.Aiming at the problems that Energy Internet terminals are difficult to be trusted and the integrity of massive terminals cannot be guaranteed,this paper designs and implements a set of comprehensive credibility measures and security protection schemes,isolates various malicious operations,and ensures that the system is always in a credible state.Specifically,we develop a secure TF card control program in the Android terminal application layer to realize the overall security scheme.Experimental results prove that this security protection scheme can effectively detect illegal application packages in energy Internet terminal devices,resist malicious programs,and protect key data from theft at the same time,achieving security protection in the“thing-to-thing”interconnection scenario of the Energy Internet. 展开更多
关键词 Energy Internet trusted execution environment Android terminal secure TF card
原文传递
一种分布式的隐私保护数据搜索方案
11
作者 刘明达 拾以娟 +1 位作者 饶翔 范磊 《计算机科学》 CSCD 北大核心 2022年第10期291-296,共6页
针对高敏数据上云后造成数据孤岛,从而导致数据无法互相搜索、互相发现,进而无法共享的问题,提出了一种分布式的隐私保护数据搜索方案,该方案实现了分布式场景下数据和搜索条件双向保密,并能够建立可信的搜索存证。首先对数据模型进行定... 针对高敏数据上云后造成数据孤岛,从而导致数据无法互相搜索、互相发现,进而无法共享的问题,提出了一种分布式的隐私保护数据搜索方案,该方案实现了分布式场景下数据和搜索条件双向保密,并能够建立可信的搜索存证。首先对数据模型进行定义,明确了方案保护的目标和应用场景;其次提出了方案的设计框架和协议流程,重点对基于区块链的可信数据交互通道、可信密钥共享模块和密文搜索引擎3个部分的整体性流程进行描述;然后提出了一种基于可信执行环境的密文态下的全文搜索引擎Tantivy-SGX,重点对原理和实现方法进行详细分析;最后对整体流程和核心部分进行实现与验证。实验结果表明,该方案高效可行,能够有效增强分布式环境下的数据发现与搜索安全。 展开更多
关键词 分布式环境 密文搜索 可信执行 区块链
下载PDF
A blockchain-enabled wiki framework based on participatory design
12
作者 Zheng Xu Chaofan Liu +2 位作者 Peng Zhang Tun Lu Ning Gu 《Digital Communications and Networks》 SCIE CSCD 2022年第6期995-1004,共10页
The 5G mobile Internet facilitates contents generation for online communities and platforms through human-to-human collaboration.Wikipedia,a well-known online community,uses wiki technology to build an encyclopedia th... The 5G mobile Internet facilitates contents generation for online communities and platforms through human-to-human collaboration.Wikipedia,a well-known online community,uses wiki technology to build an encyclopedia through collective intelligence and collaboration.Mainstream wiki systems adopt a centralized implementation,and while existing studies have optimized the efficiency of the wiki systems'centralized implementation,these systems still suffer from a lot of problems,for example,opacity and distrust.Over the years,blockchain has brought a flurry of fervour and decentralization to the system architecture,meanwhile giving users a sense of trust and participation.Thus,an innovative blockchain-enabled wiki framework called DecWiki is proposed to build one transparent,truthful,collaborative and autonomous encyclopedia.After several participatory design iterations,we present DecWiki's detailed architecture and its implementation in the form of a smart contract and use the interplanetary file system to complement the big data storage.Meanwhile,we use the trusted execution environment to secure sensitive information in the wireless scenario.Finally,the system overhead and the acceptance of the prototype are evaluated.Extensive experiments present its significant performance. 展开更多
关键词 Blockchain WIKI Participatory design trusted execution envir onment Smart contract
下载PDF
Reliability and Incentive of Performance Assessment for Decentralized Clouds
13
作者 Jiu-Chen Shi Xiao-Qing Cai +4 位作者 Wen-Li Zheng Quan Chen De-Ze Zeng Tatsuhiro Tsuchiya Min-Yi Guo 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第5期1176-1199,共24页
Decentralized cloud platforms have emerged as a promising paradigm to exploit the idle computing resources across the Internet to catch up with the ever-increasing cloud computing demands.As any user or enterprise can... Decentralized cloud platforms have emerged as a promising paradigm to exploit the idle computing resources across the Internet to catch up with the ever-increasing cloud computing demands.As any user or enterprise can be the cloud provider in the decentralized cloud,the performance assessment of the heterogeneous computing resources is of vital significance.However,with the consideration of the untrustworthiness of the participants and the lack of unified performance assessment metric,the performance monitoring reliability and the incentive for cloud providers to offer real and stable performance together constitute the computational performance assessment problem in the decentralized cloud.In this paper,we present a robust performance assessment solution RODE to solve this problem.RODE mainly consists of a performance monitoring mechanism and an assessment of the claimed performance(AoCP)mechanism.The performance monitoring mechanism first generates reliable and verifiable performance monitoring results for the workloads executed by untrusted cloud providers.Based on the performance monitoring results,the AoCP mechanism forms a unified performance assessment metric to incentivize cloud providers to offer performance as claimed.Via extensive experiments,we show RODE can accurately monitor the performance of cloud providers on the premise of reliability,and incentivize cloud providers to honestly present the performance information and maintain the performance stability. 展开更多
关键词 decentralized cloud computing robust performance assessment trusted execution environment(TEE)
原文传递
Efficient and fair coin mixing for Bitcoin
14
作者 GONG Xunwu HU Bin +1 位作者 LIU Xiaodong ZHAO Xiaofang 《High Technology Letters》 EI CAS 2022年第3期259-271,共13页
Bitcoin transactions are pseudo-anonymous,which can be exploited to reveal a user’s private information.To eliminate this threat,this paper presents FairMixer,a highly secure and efficient Bitcoin mixing system using... Bitcoin transactions are pseudo-anonymous,which can be exploited to reveal a user’s private information.To eliminate this threat,this paper presents FairMixer,a highly secure and efficient Bitcoin mixing system using the trusted execution environments(TEEs).With the TEE’s confidentiality and integrity guarantees for code and data,FairMixer enables a correct and privacy-preserving mixing process.However,a TEE-based implementation cannot prevent the manipulation of inputs to the mixer,such as mixing request submissions and blockchain feeds.Against this background,FairMixer captures users’ mixing requests via Bitcoin transactions for deterring a malicious service provider from dropping benign participants.To constrain misbehavior during a mixing mission,a misconduct monitoring mechanism and a penalty mechanism are introduced.The proposed scheme is fully compatible with Bitcoin and forces mixes to be accountable.Finally,a prototype of FairMixer is provided using Intel Software Guard Extensions(SGX) and its performance is evaluated in the Bitcoin Testnet.FairMixer mixes 700 inputs in just 8.39 s,which outperforms most existing decentralized mixers. 展开更多
关键词 coin mixing trusted execution environment(TEE) blockchain accountable ANONYMITY
下载PDF
Distributed Trusted Computing for Blockchain-Based Crowdsourcing
15
作者 Yihuai Liang Yan Li Byeong-Seok Shin 《Computers, Materials & Continua》 SCIE EI 2021年第9期2825-2842,共18页
A centralized trusted execution environment(TEE)has been extensively studied to provide secure and trusted computing.However,a TEE might become a throughput bottleneck if it is used to evaluate data quality when colle... A centralized trusted execution environment(TEE)has been extensively studied to provide secure and trusted computing.However,a TEE might become a throughput bottleneck if it is used to evaluate data quality when collecting large-scale data in a crowdsourcing system.It may also have security problems compromised by attackers.Here,we propose a scheme,named dTEE,for building a platform for providing distributed trusted computing by leveraging TEEs.The platform is used as an infrastructure of trusted computations for blockchain-based crowdsourcing systems,especially to securely evaluate data quality and manage remuneration:these operations are handled by a TEE group.First,dTEE uses a public blockchain with smart contracts to manage TEEs without reliance on any trusted third parties.Second,to update TEE registration information and rule out zombie TEEs,dTEE uses a reporting mechanism.To attract TEE owners to join in and provide service of trusted computations,it uses a fair monetary incentive mechanism.Third,to account for malicious attackers,we design a model with Byzantine fault tolerance,not limited to a crash-failure model.Finally,we conduct an extensive evaluation of our design on a local cluster.The results show that dTEE finishes evaluating 10,000 images within one minute and achieves about 65 tps throughput when evaluating Sudoku solution data with collective signatures both in a group of 120 TEEs. 展开更多
关键词 Crowdsourcing blockchain distributed trusted execution environment Byzantine fault tolerance
下载PDF
基于可信计算技术构建电力监测控制系统网络安全免疫系统 被引量:43
16
作者 高昆仑 王志皓 +1 位作者 安宁钰 赵保华 《工程科学与技术》 EI CAS CSCD 北大核心 2017年第2期28-35,共8页
电力系统是国家重要基础设施,电网调度控制系统是现代大电网安全稳定运行的重要手段,也是国家级网络对抗中的重点攻击目标。中国电网已经全面建成了以网络隔离及边界防护为主的网络安全纵深防护体系,但面对以快速演进的恶意代码为主要... 电力系统是国家重要基础设施,电网调度控制系统是现代大电网安全稳定运行的重要手段,也是国家级网络对抗中的重点攻击目标。中国电网已经全面建成了以网络隔离及边界防护为主的网络安全纵深防护体系,但面对以快速演进的恶意代码为主要技术手段的APT攻击,存在防护技术滞后于攻击手段、安全功能制约于业务功能、防护措施影响控制业务实时性等问题。可信计算是一种运算与保护并行结构的计算模式,通过保持计算环境及计算逻辑的完整性,为计算平台提供了对恶意代码、非法操作的自主免疫能力。基于可信计算技术,建立电力监测控制系统网络安全免疫系统,由控制主站系统电力可信计算平台、可信网络通信及可信现场测控终端构成,覆盖电力控制业务从现场监测、通信、计算分析、控制指令下达与执行全部环节,为电力控制系统提供了一种行之有效的主动防御机制。主站系统电力可信计算平台包括作为信任根的可信密码模块硬件和嵌入到操作系统内核的可信软件基两个核心组件,实现计算机的可信引导,对操作系统及应用程序的完整性度量、强制访问控制和强制执行控。电力可信计算平台在标准的信任链构建方法基础上,在操作系统引导器中植入度量代码,通过CPU实模式驱动下的可信密码硬件对系统引导程序代码完整性进行回溯度量。与当前通用的可信计算技术实现方式相比,电力可信计算平台将度量的起点从操作系统前推到操作系统引导器,从而使得系统安全性大幅度提升。结合电网调度控制系统中的安全标签机制,电力可信计算平台对应用进程实现了融合操作系统层和应用层的双重强制访问控制。结合调度数字证书系统,实现了应用程序预期值安全管理,确保预期值的真实性与权威性。电力可信计算平台使用了计算组件中的原生安� 展开更多
关键词 可信计算 安全免疫 主动防御 信任链优化 强制访问控制 强制执行控制
下载PDF
基于边缘计算的可信执行环境研究 被引量:29
17
作者 宁振宇 张锋巍 施巍松 《计算机研究与发展》 EI CSCD 北大核心 2019年第7期1441-1453,共13页
边缘计算概念的提出引入了一个新兴的计算模型,它不仅可以缓解传统云计算模型中由于数据传输造成的高延迟问题,同时也有益于保持隐私数据及安全敏感数据的机密性.然而,边缘计算节点本身执行环境的安全性依然是一个不可忽略的问题,它时... 边缘计算概念的提出引入了一个新兴的计算模型,它不仅可以缓解传统云计算模型中由于数据传输造成的高延迟问题,同时也有益于保持隐私数据及安全敏感数据的机密性.然而,边缘计算节点本身执行环境的安全性依然是一个不可忽略的问题,它时刻威胁着整个边缘计算模型的安全.得益于硬件厂商在各平台上推出可信执行环境,通过将这些可信执行环境集成至边缘计算节点中可以有效地保障这些节点上运算的安全性.此研究首先分析了一系列传统计算模型中的可信执行环境,并讨论了这些可信执行环境各自的优缺点.其后,在此基础上,深入研究了Intel软件防护扩展和ARM TrustZone这2个流行的可信执行环境,并分别在Intel雾计算节点参考设计样机和ARM Juno开发板上对这2个可信执行环境的安全性和性能进行了分析与测试.结果显示:这些硬件辅助的可信执行环境的引入能够在基本不影响整个系统性能的同时,增强边缘计算平台的安全性.为了帮助提高可信执行环境在边缘计算模型下的可靠性,最后总结了将可信执行环境使用在边缘计算模型中将要面对的安全挑战. 展开更多
关键词 边缘计算 可信执行环境 trustZONE 软件防护扩展 系统安全 雾计算
下载PDF
创新发展中的可信计算理论与技术 被引量:24
18
作者 冯登国 刘敬彬 +1 位作者 秦宇 冯伟 《中国科学:信息科学》 CSCD 北大核心 2020年第8期1127-1147,共21页
可信计算以硬件安全机制为基础,建立可信赖计算环境,从体系结构上全面增强系统和网络信任,是当前学术界和产业界的关注热点.随着信息技术的深入发展,新应用场景的不断涌现,网络空间的安全威胁日益严峻,因此可信计算在重要信息系统的安... 可信计算以硬件安全机制为基础,建立可信赖计算环境,从体系结构上全面增强系统和网络信任,是当前学术界和产业界的关注热点.随着信息技术的深入发展,新应用场景的不断涌现,网络空间的安全威胁日益严峻,因此可信计算在重要信息系统的安全防护领域将发挥越来越重要的作用.本文从创新发展角度,围绕作者20年来在可信计算领域的研究成果,综述了可信计算理论的发展历程,提炼总结出涵盖两大方法基础、三大信任核心和四大关键技术的可信计算技术体系,阐述了移动可信计算、抗量子可信计算、可信物联网、可信云、可信区块链等方面的重要研究问题以及可信计算在这些领域的融合创新成果.在移动可信计算方面,软硬件结合的可信执行环境体系架构设计和实现是研究重点,其次,移动操作系统内核运行时安全隔离防护,以及基于可信执行环境(trusted execution environment,TEE)的移动应用安全防护也是两个重要研究问题.在可信物联网方面,由于嵌入式环境本身的特性以及资源的受限,轻量级的信任根构建、高效安全的软件证明、实用的安全代码更新机制、集群设备证明是该领域有待进一步研究的重要问题.在抗量子可信计算、可信云、可信区块链等新型场景中,可信计算技术也在不断地拓展其应用边界,发挥更加重要的作用.最后本文展望和讨论了可信计算未来的发展趋势. 展开更多
关键词 可信计算 可信执行环境 移动可信计算 抗量子可信计算 可信物联网 可信云 可信区块链
原文传递
基于信任扩展的可信虚拟执行环境构建方法研究 被引量:24
19
作者 王丽娜 高汉军 +2 位作者 余荣威 任正伟 董永峰 《通信学报》 EI CSCD 北大核心 2011年第9期1-8,共8页
为保护虚拟机运行环境及上层服务软件的完整性、安全性,提出了一种基于信任扩展的可信虚拟执行环境的构建方法。首先,建立物理平台配置寄存器(PCR,platform configuration register)与虚拟PCR的映射关系,以此实现虚拟可信平台模块(vTPM... 为保护虚拟机运行环境及上层服务软件的完整性、安全性,提出了一种基于信任扩展的可信虚拟执行环境的构建方法。首先,建立物理平台配置寄存器(PCR,platform configuration register)与虚拟PCR的映射关系,以此实现虚拟可信平台模块(vTPM)与底层可信计算基的绑定;其次,利用本地vTPM管理器签发证书,完成可信证书链在虚拟机中的延伸。通过物理平台至虚拟平台的信任扩展,虚拟机可以有效地利用TPM提供的相关功能(如远程证明、密封存储等),完成平台环境的证明及私密信息的安全存储,从而构建了可信虚拟执行环境。最后,实现了原型系统并进行了测试,测试结果证明本系统可以有效地实现虚拟平台的密封存储和远程证明等功能。 展开更多
关键词 信任扩展 可信虚拟执行环境 可信平台模块 密封存储 远程证明
下载PDF
基于Trustzone的强安全需求环境下可信代码执行方案 被引量:20
20
作者 张英骏 冯登国 +1 位作者 秦宇 杨波 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2224-2238,共15页
针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控... 针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控模块无法被不可信内核篡改或绕过.以此为基础为可信进程提供可执行文件完整性、运行时代码完整性、控制流完整性3种层次的白名单保护,确保设备只能执行符合白名单策略的授权代码.通过构建通信客户端进程与Trustzone安全世界的安全共享内存区,利用Trustzone对外设中断事件的控制能力构建可信时钟中断源,确保Trustzone安全世界与中控服务器通信的隐私性、不可屏蔽性.在此基础上设计安全的白名单更新与平台状态证明协议.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率. 展开更多
关键词 白名单 可信代码执行 trustzone技术 可信执行环境 内核飞地 平台状态证明
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部