网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (10): 44-51.doi: 10.11959/j.issn.2096-109x.2017.00209

• 学术论文 • 上一篇    下一篇

基于嵌入式可信平台的运行时监控方法

孙召昌(),马建峰,孙聪,卢笛   

  1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
  • 修回日期:2017-09-16 出版日期:2017-10-01 发布日期:2017-11-13
  • 作者简介:孙召昌(1992-),男,河北邢台人,西安电子科技大学硕士生,主要研究方向为可信计算、运行时监控。|马建峰(1963-),男,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线和移动安全。|孙聪(1982-),男,陕西兴平人,博士,西安电子科技大学副教授,主要研究方向为信息流安全、可信软件。|卢笛(1983-),男,陕西安康人,博士,西安电子科技大学讲师,主要研究方向为云计算、网络与系统安全。
  • 基金资助:
    国家自然科学基金资助项目(61303033);国家自然科学基金资助项目(U1405255);国家高技术研究发展计划(“863”计划)基金资助项目(2015AA017203);陕西省自然科学基础研究计划基金资助项目(2016JM6034);航空科学基金资助项目(20141931001);工信部某专项科研基金资助项目(MJ-2014-S-37)

Approach on runtime monitoring based on the embedded trusted platforms

Zhao-chang SUN(),Jian-feng MA,Cong SUN,Di LU   

  1. School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2017-09-16 Online:2017-10-01 Published:2017-11-13
  • Supported by:
    The National Natural Science Foundation of China(61303033);The National Natural Science Foundation of China(U1405255);The Aviation Science Foundation of China(20141931001);The Special Research Foundation of MIIT(MJ-2014-S-37)

摘要:

当前可信计算平台缺乏对自身运行时安全属性的监控,对此,提出一种针对嵌入式可信平台的运行时监控方法。通过自动化的代码插入和运行时实时监控,保证可信平台的运行时安全功能符合设计规范,并保证系统性能和运行状态符合特定条件约束,同时对相应的异常进行实时处理。实验结果表明,随着监控节点数的增长,监控的准确性和实时性提高,而监控开销和异常处理开销处于合理范围。

关键词: 可信计算, 运行时监控, 嵌入式系统, 线性时序逻辑

Abstract:

The state-of-art trusted computing platforms fall short of monitoring its own runtime security properties.In order to mitigate these problems,an approach on runtime monitoring for the embedded trusted platforms was proposed.With the automated code instrumentation and the runtime monitoring,that the runtime security functionalities were consistent with the design specifications of trusted computing platforms could be made sure.The system performance and states meet specific constraints could also be ensured.The runtime exceptions on the specific properties were handled in real-time.The experimental results show that with the increase on the number of monitoring nodes,the precision and real-time performance of proposed runtime monitoring increase.Meanwhile,the costs on the monitoring and the exception handling are moderate.

Key words: trusted computing, runtime verification, embedded system, linear temporal logic

中图分类号: 

No Suggested Reading articles found!