Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (10): 44-51.doi: 10.11959/j.issn.2096-109x.2017.00209

• Papers • Previous Articles     Next Articles

Approach on runtime monitoring based on the embedded trusted platforms

Zhao-chang SUN(),Jian-feng MA,Cong SUN,Di LU   

  1. School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2017-09-16 Online:2017-10-01 Published:2017-11-13
  • Supported by:
    The National Natural Science Foundation of China(61303033);The National Natural Science Foundation of China(U1405255);The Aviation Science Foundation of China(20141931001);The Special Research Foundation of MIIT(MJ-2014-S-37)

Abstract:

The state-of-art trusted computing platforms fall short of monitoring its own runtime security properties.In order to mitigate these problems,an approach on runtime monitoring for the embedded trusted platforms was proposed.With the automated code instrumentation and the runtime monitoring,that the runtime security functionalities were consistent with the design specifications of trusted computing platforms could be made sure.The system performance and states meet specific constraints could also be ensured.The runtime exceptions on the specific properties were handled in real-time.The experimental results show that with the increase on the number of monitoring nodes,the precision and real-time performance of proposed runtime monitoring increase.Meanwhile,the costs on the monitoring and the exception handling are moderate.

Key words: trusted computing, runtime verification, embedded system, linear temporal logic

CLC Number: 

No Suggested Reading articles found!