基于TPM的运行时软件可信证据收集机制
基金项目:

Supported by the National Basic Research Program of China under Grant No.2009CB320703 (国家重点基础研究发展计划(973)); the National High-Tech Research and Development Plan of China under Grant Nos.2007AA01Z462, 2007AA010304, 2008AA01Z133 (国家高技术研究发展计划(863)); the Fund for Creative Research Groups of China under Grant No.60821003 (国家创新研究群体科学 基金)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [45]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    扩展了已有的软件可信性证据模型,引入了运行时软件可信证据,从而提供了更为全面的软件可信证据模型.为了提供客观、真实、全面的可信证据,提出了一种基于可信计算技术的软件运行时可信证据收集机制.利用可信平台模块(trusted platform module,简称TPM)提供的安全功能,结合“最新加载技术(late launch)”,在操作系统层引入了一个可信证据收集代理.此代理利用TPM,可以客观地收集目标应用程序的运行时可作为软件可信证据的信息,并保障可信证据本身的可信性.该可信证据收集机制具有良好的可扩展性,能够支持面向不同应用的信任评估模型.基于Linux Security Module,在Linux中实现了一个可信证据收集代理的原型.基于该原型,分析了一个分布式计算客户端实例的相关可信属性,并且分析了可信证据收集代理在该应用实例中的性能开销.该应用实例验证了该方案的可行性.

    Abstract:

    This paper extends the software trustworthiness evidence framework to include the runtime software trustworthiness evidence. To collect software trustworthiness evidence in an objective, genuine and comprehensive way, it proposes a runtime software trustworthiness evidence collection mechanism based on trusted computing technology. Based on the features provided by TPM (trusted platform module), as well as the late launch technology, a trusted evidence collection agent is introduced in an operating system kernel. The agent can securely monitor executing programs and collect their trustworthiness evidence accordingly. The agent also provides some trusted services for programs to collect application specific evidences and guarantees the trustworthiness of these evidences. This mechanism has good scalability to support various applications and software trustworthiness evaluation models. This paper also implements a prototype for the agent based on Linux security model in Linux. Based on the prototype, it studies the trustworthiness evaluation for executing a client program in a distributed computing environment. In this application, the performance of prototype is studied, and the feasibility of this approach is demonstrated.

    参考文献
    [1] European space agency—The inquiry board. Ariane 5 Flight 105 Inquiry Board Report. Paris: European Space Agency Press, 1996.
    [2] Stone B. 11 charged in the theft of 41 million card numbers. The New York Times, 2008. http://www.nytimes.com/2008/08/06/ business/06theft.html
    [3] Yang FQ, Mei H, Lü J, Jin Z. Some discussion on the development of software technology. Acta Electronica Sinica, 2002, 30(12A): 1901-1906 (in Chinese with English abstract).
    [4] Lü J, Ma XX, Tao XP, Xu F, Hu H. Research and progress on Internetware. Science in China (Series E), 2006,36(10):1037-1080 (in Chinese).
    [5] TRUSTIE (Trustworthy software tools and integration environment). 2009. http://www.trustie.org (in Chinese)
    [6] Shen CX, Zhang HG, Feng DG, Cao ZF, Huang JW. Survey of information security. Science in China (Series E), 2007,37(2): 129-150 (in Chinese).
    [7] TRUSTIE. Software trustworthiness evidence framework specification working draft 1.0. Version 2, 2009 (in Chinese). http://www.trustie.net/UserFiles/File/%5BTRUSTIE-STE%5D%E8%BD%AF%E4%BB%B6%E5%8F%AF%E4%BF%A1%E8%AF%81%E6%8D%AE%E6%A1%86%E6%9E%B6%E8%A7%84%E8%8C%83%5BV2.0%5D-200906.pdf
    [8] TRUSTIE. Software trustworthiness classification specification. Version 2, 2009 (in Chinese). http://www.trustie.net/UserFiles/ File/%5BTRUSTIE-STC%5D%E8%BD%AF%E4%BB%B6%E5%8F%AF%E4%BF%A1%E5%88%86%E7%BA%A7%E8%A7%84%E8%8C%83%5BV2.0%5D-200906.pdf
    [9] Trusted Computing Group. TCG specification architecture overview (revision 1.4). Revision 1.4, 2007. http://www. trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview. pdf
    [10] Intel. Intel? trusted execution technology. 2006. http://www.intel.com/technology/security/downloads/TrustedExec_Overview.pdf
    [11] Intel. Intel? trusted execution technology software development guide. 2008. http://download.intel.com/technology/security/ downloads/315168.pdf
    [12] AMD. AMD64 Virtualization Codenamed “Pacifica” Technology-Secure Virtual Machine Architecture Reference Manual. 2005. http://www.mimuw.edu.pl/~vincent/lecture6/sources/amd-pacifica-specification.pdf
    [13] Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D. Terra: A virtual machine-based platform for trusted computing. In: Scott ML, Peterson LL, eds. Proc. of the 19th ACM Symp. on Operating Systems Principles (SOSP 2003). New York: ACM Press, 2003. 193-206.
    [14] State Password Administration Committee in China. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing. Beijing: State Password Administration Committee in China, 2007 (in Chinese).
    [15] Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A. Xen and the art of virtualization. In: Scott ML, Peterson LL, eds. Proc. of the 19th ACM Symp. on Operating Systems Principles (SOSP 2003). New York: ACM Press, 2003. 164-177.
    [16] Gu L, Ding X, Deng RH, Xie B, Mei H. Remote attestation on program execution. In: Xu S, Nita-Rotaru C, Seifert JP, eds. Proc. of the STC 2008. 2008. 11-20.
    [17] Sailer R, Zhang X, Jaeger T, van Doorn L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkeley: USENIX, 2004. 223-238.
    [18] Wright C, Cowan C, Smalley S, Morris J, Kroah-Hartman G. Linux security modules: General security support for the Linux kernel. In: Proc. of the 11th USENIX Security Symp. Berkeley: USENIX, 2002. 17-31.
    [19] Berkeley University. Berkeley open infrastructure for network computing (BOINC). 2009. http://boinc.berkeley.edu/
    [20] Anderson JP. Computer security technology planning study. Technical Report, ESD-TR-73-51, Bedford: Electronic Systems Division, L.G. Hanscom Field, 1972.
    [21] Laprie JC. Dependable computing and fault tolerance: Concepts and terminology. In: Proc. of the 15th IEEE Int’l Symp. on Fault- Tolerant Computing. Los Alamitos: IEEE Computer Society Press, 1985. 2-11.
    [22] Avizienis A, Laprie JC, Randell B, Landwehr CE. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable Secure Computing, 2004,1(1):11-33.
    [23] Avizienis A, Laprie JC, Randell B. Fundamental concepts of dependability. Technical Report, cs-TR-739, Newcastle University, 2001.
    [24] Microsoft. Trustworthy computing. 2002. http://www.microsoft.com/mscorp/twc/default.mspx
    [25] High Confidence Software and Systems Coordinating Group. High confidence software and systems research needs. 2001. http://www.ccic.gov/pubs/hcss2research.pdf
    [26] Sub committee on networking and information technology research and development committee on technology national science and technology council. The Networking and Information Technology Research and Development Program. 2009. http://www.nitrd.gov/Pubs/2009supplement/NITRD-09Supp_FINAL-Web.pdf
    [27] ISO/IEC. ISO/IEC 15408-1: Information technology—Security techniques—Evaluation criteria for IT security—Part 1: Introduction and general model. 1999. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber= 27632
    [28] Chen HW, Wang J, Dong W. High confidence software engineering technologies. Acta Electronica Sinica, 2003,31(12A): 1933-1938 (in Chinese with English abstract).
    [29] Wang HM, Tang YB, Yin G, Li L. Trustworthiness of Internet-based software. Science in China (Series E), 2006, 36(10): 1156-1169 (in Chinese).
    [30] ISO. ISO/IEC 9126 software engineering—Product quality—Part 1: Quality model. 2001. http://www.iso.org/iso/iso_catalogue/ catalogue_tc/catalogue_detail.htm?csnumber=22749&commid=45020
    [31] Xu F, Lü J. Research and development of trust management in Web security. Journal of Software, 2002,13(11):2057-2064 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/13/2057.pdf
    [32] J?sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decision Support Systems, 2006, 43(2):618-644.
    [33] Zhou MH, Mei H, Jiao WP. A customizable trust management framework based on middleware. Acta Electronica Sinica, 2005, 33(5):820-826 (in Chinese with English abstract).
    [34] Li XY, Shen CX, Zuo XD. An efficient attestation for trustworthiness of computing platform. In: Proc. of the 2006 Int’l Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006). Washington: IEEE Computer Society Press, 2006. 625-630.
    附中文参考文献: [3] 杨芙清,梅宏,吕建,金芝.浅论软件技术发展.电子学报,2002,30(12A):1901-1906.
    [4] 吕建,马晓星,陶先平,徐锋,胡昊.网构软件的研究与进展.中国科学(E辑),2006,36(10):1037-1080.
    [5] TRUSTIE.国家可信软件资产库及协同生产环境.2009. http://www.trustie.org
    [6] 沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述.中国科学(E辑),2007,37(2):129-150.
    [7] TRUSTIE.软件可信性证据框架规范.2009. http://www.trustie.net/UserFiles/File/%5BTRUSTIE-STE%5D%E8%BD%AF%E4 %BB%B6%E5%8F%AF%E4%BF%A1%E8%AF%81%E6%8D%AE%E6%A1%86%E6%9E%B6%E8%A7%84%E8%8C%83%5BV2.0%5D-200906.pdf
    [8] TRUSTIE.软件可信分级规范.2009. http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519- ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf
    [14] 中国国家密码管理局.可信计算密码支撑平台功能与接口规范.北京:中国国家密码管理局,2007.
    [28] 陈火旺,王戟,董威.高可信软件工程技术.电子学报,2003,31(12A):1933-1938.
    [29] 王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理.中国科学(E辑),2006,36(10):1156-1169.
    [31] 徐锋,吕建.Web安全中的信任管理研究与进展.软件学报,2002,13(11):2057-2064. http://www.jos.org.cn/1000-9825/13/2057.pdf
    [33] 周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架.电子学报,2005,33(5):820-826.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

古亮,郭耀,王华,邹艳珍,谢冰,邵维忠.基于TPM的运行时软件可信证据收集机制.软件学报,2010,21(2):373-387

复制
分享
文章指标
  • 点击次数:8828
  • 下载次数: 13726
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2009-06-15
  • 最后修改日期:2009-12-07
文章二维码
您是第20251531位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号