Trusted code remote execution through trusted computing and virtualization

被引:2
|
作者
Zhang, Liqiang [1 ]
Chen, Lu [1 ]
Zhang, Huanguo [1 ]
Yan, Fei [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engineer, Comp Sch, Wuhan, Peoples R China
关键词
D O I
10.1109/SNPD.2007.388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given two machines A and B, A has to commit job codes to be executed on B and get the results back. How can A believe that the job codes are executed correctly on B and related privacy information is not revealed? We propose the attack model and the security goals during the remote execution process. To address this research problem, we propose a new method based on Trusted Computing and Virtualization. We extend trusted computing by providing property-based attestation, job keys generating and migrating securely in TPM. We extend virtualization by using TPM and MAC in hypervisor to isolate job VM. We examine the method to the security goals and it shows that this method can solve the problem effectively.
引用
下载
收藏
页码:39 / +
页数:2
相关论文
共 50 条
  • [31] A trustzone-based trusted code execution with strong security requirements
    Zhang, Yingjun
    Feng, Dengguo
    Qin, Yu
    Yang, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2224 - 2238
  • [32] Using trusted computing in trusted mail transfer protocol
    Mohamed, Fady A.
    Hemayed, Elsayed E.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 926 - 933
  • [33] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [34] Trusted Execution on Leaky Hardware?
    Genkin, Daniel
    Yarom, Yuval
    PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 1 - 1
  • [35] Trusted computing, trusted third parties, and verified communications
    Abadi, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
  • [36] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [37] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [38] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [39] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [40] Trusted computing in context
    Schneider, Fred B.
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 4 - 5