计算机科学 ›› 2015, Vol. 42 ›› Issue (Z11): 345-347.

• 信息安全 • 上一篇    下一篇

基于独立核心安全组件的高安全体系结构

邵婧,殷红武,陈左宁,余婷   

  1. 解放军信息工程大学 郑州 450001;江南计算技术研究所 无锡 214083,解放军信息工程大学 郑州 450001;江南计算技术研究所 无锡 214083,江南计算技术研究所 无锡 214083,江南计算技术研究所 无锡 214083
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家高技术研究发展计划项目(“863”项目)(2013AA01A210 ,2013AA013203),核高基项目(2013ZX01029002-001-001)资助

High-security Architecture on Independent Core Component

SHAO Jing, YIN Hong-wu, CHEN Zuo-ning and YU Ting   

  • Online:2018-11-14 Published:2018-11-14

摘要: 构建高安全体系结构是高安全级信息系统的一个重要前提。针对现有可信计算架构和基于VMM的虚拟化架构的核心模块存在易被篡改和被旁路的威胁,设计了一个基于独立核心安全组件的高安全体系结构HAICC。该体系结构通过硬件层有效实现了安全功能与计算功能的强隔离,将系统划分为独占不同物理资源的安全服务子系统和目标计算子系统,前者作为独立核心安全组件实施对整个计算系统的主动度量、实时监控、安全关键数据恢复。系统攻击实例及安全性分析表明,HAICC体系结构有效缓解了核心安全组件被篡改和被旁路的风险,提高了系统安全机制的完整有效性。

关键词: 高安全,体系结构,防旁路,防篡改,强隔离

Abstract: Building a high-security architecture is an important precondition of high-security information system.The core components of trusted computing architectures and virtualization architecture may be modified and bypassed.Aiming at this risk,a high-security architecture on independent core component(HAICC) was proposed.The architecture realizes strong isolation of security and computing functions by hardware.The system is divided into secure server sub-system and targeted computing sub-system,which occupy different physical resources.The former sub-system implements active measurement,runtime monitoring and key data recovery of the whole computing sub-system.The attack instance and security analysis show that,HAICC reduces the risk of modification and bypass for core security component,and enhances the integrity of security mechanisms.

Key words: High security,Architecture,Bypass prevention,Modification prevention,Strong isolation

[1] Peinado M,Chen Y,England P,et al.NGSCB:A trusted open system[M]∥Information Security and Privacy.Springer Berlin Heidelberg,2004:86-97
[2] Sailer R,Zhang X,Jaeger T.Design and Implementation of aTCG-based Integrity Measurement Architecture[C]∥Procee-dings of 13th Usenix Security Symposium.San Diego,California,2004:223-238
[3] Pfitzmann B,Riordan J,Stuble C,et al.The PERSEUS system architecture :RZ 3335[R].2001
[4] Sailer R,Valdez E,Jaeger T,et al.sHype:Secure hypervisor approach to trusted virtualized systems:RC23511[R].2005
[5] McDermott J,Freitas L.A formal security policy for xenon[C]∥Proceedings of the 6th ACM workshop on Formal methods in security engineering.ACM,2008:43-52
[6] Coker G.Xen security modules(xsm)[C]∥Xen Summit.2006:1-33
[7] Kivity A,Kamay Y,Laor D,et al.Kvm:the Linux virtual machine monitor[C]∥Proceedings of the Linux Symposium.2007:225-230
[8] 项国富,金海,邹德清,等.基于虚拟化的安全监控[J].软件学报,2012,23(8):2173-2187

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!