Dynamic Integrity Measurement Model Based on Trusted Computing

被引:5
|
作者
Liu, Changping [1 ]
Fan, Mingyu [1 ]
Feng, Yong [1 ]
Wang, Guangwei [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
关键词
D O I
10.1109/CIS.2008.153
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Root trust transfers in turn to BIOS (Basic Input Output System), OS (Operating System) and eventually applications from TPM (Trust Platform Module) in Trusted Computing. Before every, transfer of trust, integrity measurement module measures the integrity property of receiver and produces stored measurement log. A dynamic integrity measurement model is proposed to measure integrity during execution of computing platform. This model measures instruction code of operating system and user processes in memory to construct stored measurement log at the time of system call or process scheduler. A prototype is realized under Linux to analyze the validity, and performance of this model. Compared with other analogous model, this model can dynamically measure vivid integrity and detect attack during execution of computing platform with little performance cost.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
  • [31] A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
    Gong, Bei
    Wang, Yubo
    Liu, Xiangang
    Qi, Fazhi
    Sun, Zhihui
    CHINA COMMUNICATIONS, 2018, 15 (02) : 100 - 121
  • [32] A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
    Bei Gong
    Yubo Wang
    Xiangang Liu
    Fazhi Qi
    Zhihui Sun
    中国通信, 2018, 15 (02) : 100 - 121
  • [33] A Separated Domain-Based Kernel Model for Trusted Computing
    FANG Yanxiang~ 1
    2. Naval Institute of Computing Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1424 - 1428
  • [34] Unified Trusted Measurement Model of Trusted Network
    Gang, Liu Xian
    Bei, Gong
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1082 - 1084
  • [35] Security communication model for vehicular clouds based on trusted computing
    Zhang, Wenbo
    Bao, Zhenshan
    Li, Jian
    Zhan, Jing
    Zhang, Wenbo (zhangwenbo@bjut.edu.cn), 1600, Huazhong University of Science and Technology (42): : 102 - 105
  • [36] Trusted computing model based on server-end storage
    Tan, Zhiyong
    Si, Tiange
    Liu, Duo
    Dai, Yiqi
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (07): : 1012 - 1014
  • [37] Trusted computing based open environment user authentication model
    Cyber Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
    不详
    ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):
  • [38] A model-driven framework for trusted computing based systems
    Alam, Masoom
    Seifert, Jean-Pierre
    Zhan, Xinwen
    11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 75 - +
  • [39] A multi-level security model based on trusted computing
    Jia, Zhao
    Liu Ji-qiang
    Jing, Chen
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
  • [40] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):