• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.
Citation: Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.

Dynamical Integrity of Codes: Model and Method

More Information
  • Published Date: September 14, 2012
  • In the research of information security and trusted computing, measuring dynamic integrity of codes under adversariesattacks is an important problem, especially in the context, such as wireless sensor network, cloud computing etc. In the open and less coupled systems, this issue is much more urgent. Hardware-based technologies of trusted computing and methods in (software based) code attestation can successfully measure some property of program, static or code oriented, but fail to measure integrity of certain behaviors during the executing of codes. This situation partially is due to the lack of proper theory of dynamic integrity, which can be changed with sound and precise concepts and models of measuring dynamic integrity. In this paper, we develop the concept of dynamic integrity after analysis of attacks and model of measuring dynamic integrity, and use the idea of provable secure from cryptography to give a formal notion of the concept. And we discuss its relationship with several other cryptography primitives, such as message authentication code schemes, code obfuscation etc. Based on the model, a complier-aided flow embedding method is proposed to achieve a weak form of dynamic integrity scheme, and security and efficiency are analyzed with some reasonable assumptions. Finally, we discuss how to compile any program enhanced by dynamic integrity measurable scheme and issues concerning the compiling process.
  • Related Articles

    [1]Pan Xuan, Xu Sihan, Cai Xiangrui, Wen Yanlong, Yuan Xiaojie. Survey on Deep Learning Based Natural Language Interface to Database[J]. Journal of Computer Research and Development, 2021, 58(9): 1925-1950. DOI: 10.7544/issn1000-1239.2021.20200209
    [2]Li Yin. Test Suite Generating for Stateful Web Services Using Interface Contract[J]. Journal of Computer Research and Development, 2017, 54(3): 609-622. DOI: 10.7544/issn1000-1239.2017.20151045
    [3]Dong Yongquan, Li Qingzhong, Ding Yanhui, Peng Zhaohui. Constrained Conditional Random Fields for Semantic Annotation of Web Data[J]. Journal of Computer Research and Development, 2012, 49(2): 361-371.
    [4]Tian Jianwei and Li Shijun. Retrieving Deep Web Data Based on Hierarchy Tree Model[J]. Journal of Computer Research and Development, 2011, 48(1): 94-102.
    [5]Kou Yue, Li Dong, Shen Derong, Yu Ge, Nie Tiezheng. D-EEM: A DOM-Tree Based Entity Extraction Mechanism for Deep Web[J]. Journal of Computer Research and Development, 2010, 47(5): 858-865.
    [6]Ding Guohui, Wang Guoren, and Zhao Yuhai. Multi-Schema Integration Based on Usage and Clustering Approach[J]. Journal of Computer Research and Development, 2010, 47(5): 824-831.
    [7]Shen Derong, Ma Ye, Nie Tiezheng, Kou Yue, and Yu Ge. A Query Relaxation Strategy Applied in a Deep Web Data Integration System[J]. Journal of Computer Research and Development, 2010, 47(1): 88-95.
    [8]Ma Anxiang, Zhang Bin, Gao Kening, Qi Peng, and Zhang Yin. Deep Web Data Extraction Based on Result Pattern[J]. Journal of Computer Research and Development, 2009, 46(2): 280-288.
    [9]Qu Yuzhong, Hu Wei, Zheng Dongdong, and Zhong Xinyu. Mapping Between Relational Database Schemas and Ontologies: The State of the Art[J]. Journal of Computer Research and Development, 2008, 45(2): 300-309.
    [10]Zhang Weiming and Song Junfeng. Study on Domain Ontology Representation, Reasoning and Integration for the Semantic Web[J]. Journal of Computer Research and Development, 2006, 43(1): 101-108.

Catalog

    Article views (875) PDF downloads (582) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return