网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (2): 50-57.doi: 10.11959/j.issn.2096-109x.2019016

• 学术论文 • 上一篇    下一篇

采用完整性威胁树的信息流完整性度量方法

吴奇烜1,2,马建峰1,孙聪1()   

  1. 1 西安电子科技大学网络与信息安全学院,陕西 西安 710071
    2 腾讯科技(深圳)有限公司,广东 深圳 518057
  • 修回日期:2019-01-20 出版日期:2019-04-15 发布日期:2019-04-16
  • 作者简介:吴奇烜(1992- ),男,陕西商洛人,西安电子科技大学硕士生,主要研究方向为系统可靠性分析、信息流安全。|马建峰(1963- ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、网络安全。|孙聪(1982- ),男,陕西兴平人,博士,西安电子科技大学副教授、博士生导师,主要研究方向为信息流安全、可信软件。
  • 基金资助:
    国家自然科学基金资助项目(61872279)

Information flow integrity measurement method using integrity threat tree

Qixuan WU1,2,Jianfeng MA1,Cong SUN1()   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 Tencent Technology (Shenzhen) Company Limited,Shenzhen 518057,China
  • Revised:2019-01-20 Online:2019-04-15 Published:2019-04-16
  • Supported by:
    The National Science Foundation of China(61872279)

摘要:

针对传统信息流完整性分析方法缺乏对具体系统结构及关联性攻击事件考虑的缺陷,提出完整性威胁树对系统信息流完整性做量化分析,提出条件触发门对存在关联的攻击事件进行建模。使用攻击代价来量化攻击各信道的难易度,依据架构相关的完整性威胁树,利用可满足性模理论及其工具求解最小攻击代价,以量化分析系统完整性威胁。通过对实际飞控系统模型的建模分析求解说明方法的实用性,并得出条件触发门参数对系统完整性的影响。

关键词: 完整性, 信息流, 可满足性模理论, 攻击树

Abstract:

In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.

Key words: integrity, information flow, satisfiability modulo theories, attack tree

中图分类号: 

No Suggested Reading articles found!