通信学报 ›› 2013, Vol. 34 ›› Issue (5): 31-41.doi: 10.3969/j.issn.1000-436x.2013.05.004

• 学术论文 • 上一篇    下一篇

基于扩展LS2的可信虚拟平台信任链分析

常德显1,2,3,冯登国1,秦宇1,张倩颖1,2   

  1. 1 中国科学院 软件研究所,北京 100190;
    2 中国科学院 研究生院,北京 100049;
    3 解放军信息工程大学 三院,河南 郑州 450004
  • 出版日期:2013-05-25 发布日期:2017-06-27
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家重点基础研究发展计划(“973计划)基金资助项目

Analyzing the trust chain of trusted virtualization platform based on the extended LS2

De-xian CHANG1,2,3,Deng-guo FENG1,Yu QIN1,Qian-ying ZHANG1,2   

  1. 1 Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;
    2 Graduate University of Chinese Academy of Sciences,Beijing 100049,China;
    3 3rd Institute,PLA Information Engineering University,Zhengzhou 450004,China
  • Online:2013-05-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Basic Research Program of China (973 Program)

摘要:

摘要:针对可信虚拟平台信任链的形式化分析问题,建立了包括虚拟机和虚拟信任根在内的可信虚拟平台完整的信任链模型,并详细定义其应满足的信任属性,通过扩展 LS2,验证了可信虚拟平台信任链模型能够有条件地满足其正确性、唯一性。对实例系统分析表明本文所建立信任链模型的通用性及基于扩展LS2分析方法的有效性。

关键词: 可信计算, 可信虚拟平台, 安全系统逻辑, 信任链, 虚拟信任根

Abstract:

Considering the effective formal analysis for the trust chain of the trusted virtualization platform,a trust chain model which includes the virtual machine and the virtual root of trust,was proposed firstly with the detail definition of the trusted properties.Through extending the LS2,it verified the correctness and uniqueness of the trust chain formally under some conditions.Analysis for the photosystem shows the generality of the proposed trust chain model and the va-lidity of the analysis method based on the extended LS2.

Key words: trusted computing, trusted virtualization platform, logic of secure system, trust chain, virtual root of trust

No Suggested Reading articles found!