Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 345-347.

Previous Articles     Next Articles

High-security Architecture on Independent Core Component

SHAO Jing, YIN Hong-wu, CHEN Zuo-ning and YU Ting   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Building a high-security architecture is an important precondition of high-security information system.The core components of trusted computing architectures and virtualization architecture may be modified and bypassed.Aiming at this risk,a high-security architecture on independent core component(HAICC) was proposed.The architecture realizes strong isolation of security and computing functions by hardware.The system is divided into secure server sub-system and targeted computing sub-system,which occupy different physical resources.The former sub-system implements active measurement,runtime monitoring and key data recovery of the whole computing sub-system.The attack instance and security analysis show that,HAICC reduces the risk of modification and bypass for core security component,and enhances the integrity of security mechanisms.

Key words: High security,Architecture,Bypass prevention,Modification prevention,Strong isolation

[1] Peinado M,Chen Y,England P,et al.NGSCB:A trusted open system[M]∥Information Security and Privacy.Springer Berlin Heidelberg,2004:86-97
[2] Sailer R,Zhang X,Jaeger T.Design and Implementation of aTCG-based Integrity Measurement Architecture[C]∥Procee-dings of 13th Usenix Security Symposium.San Diego,California,2004:223-238
[3] Pfitzmann B,Riordan J,Stuble C,et al.The PERSEUS system architecture :RZ 3335[R].2001
[4] Sailer R,Valdez E,Jaeger T,et al.sHype:Secure hypervisor approach to trusted virtualized systems:RC23511[R].2005
[5] McDermott J,Freitas L.A formal security policy for xenon[C]∥Proceedings of the 6th ACM workshop on Formal methods in security engineering.ACM,2008:43-52
[6] Coker G.Xen security modules(xsm)[C]∥Xen Summit.2006:1-33
[7] Kivity A,Kamay Y,Laor D,et al.Kvm:the Linux virtual machine monitor[C]∥Proceedings of the Linux Symposium.2007:225-230
[8] 项国富,金海,邹德清,等.基于虚拟化的安全监控[J].软件学报,2012,23(8):2173-2187

No related articles found!
Full text



No Suggested Reading articles found!