Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform

被引:1
|
作者
Yang, Yang [1 ]
Zhang, Huanguo [1 ]
Wan, Li [1 ]
Zou, Bingyu [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
关键词
Trusted computing; integrity measurement; transitive trust; information flow; CW_Lite model;
D O I
10.1109/ICYCS.2008.315
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS lip to the application layer, where the executable codes are taken the load-time measurements before execution. And the measurement system can generate an integrity proof for TPM-based remote attestation. In order to accurately reflect runtime integrity of critical applications, a light weight Clark-Wilson model is introduced for verify information flow integrity guarantee. Our experimental system strengthens the security posture of the platform. With the analysis of the tradeoff between performance and security, our system gives great consideration to the impact which the measurements cause to system performance.
引用
收藏
页码:229 / 233
页数:5
相关论文
共 50 条
  • [31] Design and Implementation of a Data Mining Platform Based on Cloud Computing
    Nie, Jing
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 318 - 321
  • [32] Design and Implementation of Face Recognition System Based on Windows
    Zhang Min
    Liu Ting
    Li Ailan
    SEVENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2015), 2015, 9631
  • [33] DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL
    Ma, Zhuo
    Lin, Wei-min
    Zhang, Tao
    Deng, Song
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 309 - 313
  • [34] Design and implementation of a TCG-based integrity measurement architecture
    Sailer, R
    Zhang, XL
    Jaeger, T
    van Doorn, L
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 223 - 238
  • [35] The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform
    Shen, Zhidong
    Wu, Xiaoping
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 672 - 676
  • [36] Implementation of trusted computing in commercial cryptogram based on hardware
    Zhao, Bo
    Liu, Shubo
    Tang, Ming
    Zhang, Huanguo
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, 2004, 29 (11):
  • [37] Implementation of ECC-based trusted platform module
    Zhang, Xing
    Zhou, Ming
    Zhijang, Jun-Xi
    Li, Man
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2168 - 2173
  • [38] Design and Implementation of Trusted-Router Based on Trust Management System
    Sun Bin
    Mao Yuankui
    CHINA COMMUNICATIONS, 2011, 8 (05) : 63 - 69
  • [39] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [40] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +