计算机应用 ›› 2012, Vol. 32 ›› Issue (04): 953-956.DOI: 10.3724/SP.J.1087.2012.00953

• 信息安全 • 上一篇    下一篇

操作系统内核的动态可信度量模型

辛思远1,赵勇2,廖建华3,王婷4   

  1. 1. 信息工程大学 电子技术学院,郑州 450004;2.北京工业大学 计算机学院,北京 100124
    2. 北京工业大学 计算机学院,北京 100124
    3. 北京大学 信息科学技术学院,北京 100871
    4. 65047部队,沈阳 100805
  • 收稿日期:2011-10-18 修回日期:2011-12-14 发布日期:2012-04-20 出版日期:2012-04-01
  • 通讯作者: 辛思远
  • 作者简介:辛思远(1984-),男,河南三门峡人,博士研究生,主要研究方向:可信计算、操作系统安全;赵勇(1980-),男,山西左权人,讲师,博士,主要研究方向:可信计算;廖建华(1978-),男,江西宁都人,博士研究生,主要研究方向:可信计算;王婷(1982-),女,河南洛阳人,工程师,博士,主要研究方向:访问控制。
  • 基金资助:
    国家863计划项目;国家973计划项目;国家“核高基”科技重大专项

Dynamic trusted measurement model of operating system kernel

XIN Si-yuan1,ZHAO Yong2,LIAO Jian-hua3,WANG Ting4   

  1. 1. Institute of Electronic Technology, Information Engineering University, Zhengzhou Henan 450004,China
    2. College of Computer Science,Beijing University of Technology,Beijing 100124,China
    3. School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
    4. Unit 65047 of PLA,Shenyang Liaoning 100805,China
  • Received:2011-10-18 Revised:2011-12-14 Online:2012-04-20 Published:2012-04-01
  • Contact: XIN Si-yuan

摘要: 动态可信度量是可信计算的研究热点和难点,针对由操作系统内核动态性所引起的可信度量困难问题,提出一种操作系统内核的动态可信度量模型,使用动态度量变量描述和构建系统动态数据对象及其关系,对内核内存进行实时数据采集,采用语义约束描述内核动态数据的动态完整性,通过语义约束检查验证内核动态数据是否维持其动态完整性。给出了模型的动态度量性质分析与证明,模型能够有效地对操作系统内核的动态数据进行可信度量,识别对内核动态数据的非法篡改。

关键词: 可信计算, 可信度量, 动态度量, 操作系统内核, 远程证明

Abstract: Dynamic trusted measurement is a hot and difficult research topic in trusted computing. Concerning the measurement difficulty invoked by the dynamic nature of operating system kernel, a Dynamic Trusted Kernel Measurement (DTKM) model was proposed. Dynamic Measurement Variable (DMV) was presented to describe and construct dynamic data objects and their relations, and the method of semantic constraint was proposed to measure the dynamic integrity of kernel components. In DTKM, the collection of memory data was implemented in real-time, and the dynamic integrity was verified by checking whether the constructed DMV was consistent with semantic constraints which were defined based on the security semantics. The nature analysis and application examples show that DTKM can effectively implement dynamic measurement of the kernel and detect the illegal modification of the kernel dynamic data.

Key words: trusted computing, trusted measurement, dynamic measurement, operating system kernel, remote attestation