Research on Security of the Extended SSL/TLS Protocol Based on Trusted Platform Module

被引:0
|
作者
Yu, Yue [1 ]
Sun, Hao [1 ]
Yu, Fajiang [1 ]
Kong, Yanan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
关键词
SSL/TLS protocol; security vulnerabilities; trusted platform module; solutions;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It is universally acknowledged that SSL/TLS has been a priority of secure communication protocol on the Internet in virtue of its broad combining ability, easy achievement and high data security, and a myriad of researches have been made on it so far. Our discussion in this paper is about basic principles and security issues of the current SSL/TLS protocol. The focus is on security vulnerabilities of the extended SSL/TLS protocol based on the Trusted Platform Module (TPM). In order to test and verify the security of the extended SSL/TLS protocol, experiments are made on two attacking methods that are surf jacking attack and SSL/TLS Renegotiating Attack; the result reveals that they can successfully damage the security of SSL/TLS protocol. Finally, according to the application environment of SSL/TLS protocol and by taking full account of the application layer protocol, browser features, the combination processes among protocols and other comprehensive factors, some specific solutions are presented by us to solve the security issues.
引用
收藏
页码:861 / 866
页数:6
相关论文
共 50 条
  • [1] Planning-based Security Testing of the SSL/TLS Protocol
    Bozic, Josip
    Kleine, Kristoffer
    Simos, Dimitris E.
    Wotawa, Franz
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 347 - 355
  • [2] Implementation of a Security Layer for the SSL/TLS Protocol
    Ordean, Mihai
    Giurgiu, Mircea
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
  • [3] Using Trusted Platform Module to Mitigate SSL Stripping
    Nor, Fazli Mat
    Jalil, Kamarularifin Abd
    Abd Kadir, Adzhar
    Ab Manan, Jamalul-lail
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 237 - +
  • [4] Research on SSL/TLS Security Differences Based on RFC Documents
    Zheng, Ziqiu
    Li, Xuejun
    Wang, He
    Wu, Gaofei
    Zhang, Yuqing
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 147 - 151
  • [5] A comprehensive study on security attacks on SSL/TLS Protocol
    Sirohi, Preeti
    Agarwal, Amit
    Tyagi, Sapna
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 893 - 897
  • [6] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Iqbal Luqman Bin Mohd Paris
    Mohamed Hadi Habaebi
    Alhareth Mohammed Zyoud
    Wireless Personal Communications, 2023, 132 : 163 - 182
  • [7] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Paris, Iqbal Luqman Bin Mohd
    Habaebi, Mohamed Hadi
    Zyoud, Alhareth Mohammed
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 163 - 182
  • [8] Research and realization of security proxy based on SSL protocol
    Wang, Yanhua
    Yang, Kuihe
    Zhang, Yun
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 264 - 267
  • [9] RAVS: Remote attestation of video security based on trusted platform module
    Ma, Q. (maqiang_my@163.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (09):
  • [10] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +