高级检索
    吴 昊 毋国庆. 程序的动态完整性:模型和方法[J]. 计算机研究与发展, 2012, 49(9): 1874-1882.
    引用本文: 吴 昊 毋国庆. 程序的动态完整性:模型和方法[J]. 计算机研究与发展, 2012, 49(9): 1874-1882.
    Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.
    Citation: Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.

    程序的动态完整性:模型和方法

    Dynamical Integrity of Codes: Model and Method

    • 摘要: 在信息安全和可信计算中,程序的动态完整性是一个重要问题,特别是无线传感器网络、云计算平台等这一类开放松耦合环境下,怎样度量程序行为的动态完整性的问题尤为突出.基于硬件的可信计算技术和代码证实技术等都没有解决具体行为的动态性度量这个问题,部分原因是缺少一个动态完整性的模型和相应的理论.针对上述问题,在分析了对程序动态完整性安全的威胁基础之上,提出了一个基于密码学的动态完整性理论模型,该模型刻画了程序动态完整性安全的各个要素.基于该模型提出了编译器辅助的流嵌入法,给出了此方法的示例,并分析了此方法的安全性和效率,最后讨论了编译器支持的相关问题,解决了动态完整性的理论和方法中的部分问题.

       

      Abstract: In the research of information security and trusted computing, measuring dynamic integrity of codes under adversariesattacks is an important problem, especially in the context, such as wireless sensor network, cloud computing etc. In the open and less coupled systems, this issue is much more urgent. Hardware-based technologies of trusted computing and methods in (software based) code attestation can successfully measure some property of program, static or code oriented, but fail to measure integrity of certain behaviors during the executing of codes. This situation partially is due to the lack of proper theory of dynamic integrity, which can be changed with sound and precise concepts and models of measuring dynamic integrity. In this paper, we develop the concept of dynamic integrity after analysis of attacks and model of measuring dynamic integrity, and use the idea of provable secure from cryptography to give a formal notion of the concept. And we discuss its relationship with several other cryptography primitives, such as message authentication code schemes, code obfuscation etc. Based on the model, a complier-aided flow embedding method is proposed to achieve a weak form of dynamic integrity scheme, and security and efficiency are analyzed with some reasonable assumptions. Finally, we discuss how to compile any program enhanced by dynamic integrity measurable scheme and issues concerning the compiling process.

       

    /

    返回文章
    返回