Trusted code remote execution through trusted computing and virtualization

被引:2
|
作者
Zhang, Liqiang [1 ]
Chen, Lu [1 ]
Zhang, Huanguo [1 ]
Yan, Fei [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engineer, Comp Sch, Wuhan, Peoples R China
关键词
D O I
10.1109/SNPD.2007.388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given two machines A and B, A has to commit job codes to be executed on B and get the results back. How can A believe that the job codes are executed correctly on B and related privacy information is not revealed? We propose the attack model and the security goals during the remote execution process. To address this research problem, we propose a new method based on Trusted Computing and Virtualization. We extend trusted computing by providing property-based attestation, job keys generating and migrating securely in TPM. We extend virtualization by using TPM and MAC in hypervisor to isolate job VM. We examine the method to the security goals and it shows that this method can solve the problem effectively.
引用
下载
收藏
页码:39 / +
页数:2
相关论文
共 50 条
  • [1] A new mechanism for trusted code remote execution
    Zhang, Liqiang
    Zhang, Huanguo
    Zhang, Xiantao
    Chen, Lu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 574 - 577
  • [2] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [3] In Pursuit of a Trusted Computing Base: The Journey through Virtualization (Keynote)
    Chen, Haibo
    PROCEEDINGS OF THE 18TH ACM SIGPLAN/SIGOPS INTERNATIONAL CONFERENCE ON VIRTUAL EXECUTION ENVIRONMENTS, VEE 2022, 2022, : 1 - 1
  • [4] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [5] Trusted code execution in Java']JavaCard
    Mana, Antonio
    Munoz, Antonio
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 269 - +
  • [6] The Trusted Execution Module: Commodity general-purpose trusted computing
    Costan, Victor
    Sarmenta, Luis F. G.
    van Dijk, Marten
    Devadas, Srinivas
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 133 - 148
  • [7] Virtualization Airborne Trusted General Computing Technology
    Zhang, Shuang
    Wang, Yuanxun
    Wan, Xinyu
    Li, Zhihui
    Guo, Yangming
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [8] The Benefits of combining Trusted Computing with Virtualization Techniques
    Schramm, Martin
    Grzemba, Andreas
    2010 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS, 2010, : 299 - 302
  • [9] Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
    Shepherd, Carlton
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [10] Formal Verification of Virtualization-Based Trusted Execution Environments
    Witharana, Hasini
    Weerasena, Hansika
    Mishra, Prabhat
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, 43 (11) : 4262 - 4273