Research on Security of the Extended SSL/TLS Protocol Based on Trusted Platform Module

被引:0
|
作者
Yu, Yue [1 ]
Sun, Hao [1 ]
Yu, Fajiang [1 ]
Kong, Yanan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
关键词
SSL/TLS protocol; security vulnerabilities; trusted platform module; solutions;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It is universally acknowledged that SSL/TLS has been a priority of secure communication protocol on the Internet in virtue of its broad combining ability, easy achievement and high data security, and a myriad of researches have been made on it so far. Our discussion in this paper is about basic principles and security issues of the current SSL/TLS protocol. The focus is on security vulnerabilities of the extended SSL/TLS protocol based on the Trusted Platform Module (TPM). In order to test and verify the security of the extended SSL/TLS protocol, experiments are made on two attacking methods that are surf jacking attack and SSL/TLS Renegotiating Attack; the result reveals that they can successfully damage the security of SSL/TLS protocol. Finally, according to the application environment of SSL/TLS protocol and by taking full account of the application layer protocol, browser features, the combination processes among protocols and other comprehensive factors, some specific solutions are presented by us to solve the security issues.
引用
收藏
页码:861 / 866
页数:6
相关论文
共 50 条
  • [41] Research on theory and key technology of trusted computing platform security testing and evaluation
    ZHANG HuanGuo1
    2Key Laboratory of Aerospace Information Security and Trusted Computing
    Science China(Information Sciences), 2010, 53 (03) : 434 - 453
  • [42] Research on theory and key technology of trusted computing platform security testing and evaluation
    HuanGuo Zhang
    Fei Yan
    JianMing Fu
    MingDi Xu
    Yang Yang
    Fan He
    Jing Zhan
    Science China Information Sciences, 2010, 53 : 434 - 453
  • [43] Research on theory and key technology of trusted computing platform security testing and evaluation
    Zhang HuanGuo
    Yan Fei
    Fu JianMing
    Xu MingDi
    Yang Yang
    He Fan
    Zhan Jing
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 434 - 453
  • [44] An SDN-Based Approach to Enhance the End-to-End Security: SSL/TLS Case Study
    Ranjbar, Alireza
    Komu, Miika
    Salmela, Patrik
    Aura, Tuomas
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 281 - 288
  • [45] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [46] FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module
    Igarramen, Zakaria
    Hedabou, Mustaha
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 211 - 214
  • [47] Dynamic trust enhanced security model for trusted platform based services
    Nagarajan, Aarthi
    Varadharajan, Vijay
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (05): : 564 - 573
  • [48] FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module
    Igarramen, Zakaria
    Hedabou, Mustapha
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 49 - 59
  • [49] Energy and execution time analysis of a software-based trusted platform module
    Aaraj, Najwa
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    2007 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2007, : 1128 - +
  • [50] Reliable Migration Module in Trusted Cloud based on Security Level - Design and Implementation
    Chen, Ying
    Shen, Qingni
    Sun, Pengfei
    Li, Yangwei
    Chen, Zhong
    Qing, Sihan
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2230 - 2236