期刊文献+

Vista中信任链建立机制研究 被引量:1

Research on mechanism of building trusted chain in Vista
在线阅读 下载PDF
导出
摘要 信任链机制是Vista建立可信环境的基础,对其实现过程及安全性分析将为Vista的安全评估提供重要依据。针对Vista中信任链的建立过程,对可信计算机制在Vista中的实现进行了详细的分析,并通过逆向工程的手段对Vista信任链建立过程中的相关代码进行了剖析,给出它们的实现方式和主要的工作流程。并对Vista信任链机制的安全性进行了分析,给出其安全隐患。 The mechanism of trusted chain is the foundation of establishing the trusted environment in Vista. The analysis of implementation ofprocess and safety can provides important basis for safety evaluation of vista. The mechanism of trusted computing in Vista operating system is analyzed in detail and the related code of building trusted chain process in Vista through reverse-engineering's method is introduced, then the work flow and the method of realizing is given. In the end, the security of trusted chain is analyzed in Vista, and safety troubles are given.
作者 郜伟 何静
出处 《计算机工程与设计》 CSCD 北大核心 2009年第15期3494-3497,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA01Z483)
关键词 信任链 VISTA 可信环境 可信计算 逆向工程 trusted chain Vista trusted environment trusted computing reverse engineering
  • 相关文献

参考文献1

二级参考文献19

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985.
  • 5Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf.
  • 6Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/.
  • 7Patel J,Teacy W T, Luke,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources[C]//Trust Management, Third International Conference, iTrust 2005. Berlin Heidelberg: Springer,2005 : 193-209.
  • 8Beth T, Borcherding M, Klein B. Valuation of Trustin Open Network[C]// Proc of the European Symposium on Research in Security (ESORICS). Brighton:Springer-Verlag, 1994 : 3-18.
  • 9Audun J. An Algebra for Assessing Trust in Certification Chains[C]// Proc of NDSS ' 99, Network and Distributed System Security Symposium. San Diego,California, USA, February 1999.
  • 10Pearson S. Trusted Computing Platform, the Next Security Solution[R]. Bristol UK: HP Laboratories,2002.

共引文献118

同被引文献8

  • 1微软官方.Digital signatures for kernel modules on sys-tems running windows vista.
  • 2Skape,Skywing. Bypassing patchguard on windows x64[EB/OL].America:Uninformed,2006.http://uninformed.org/index.cgi?v = 3&a = 3&t=sum ry,2013.
  • 3Skywing. Subverting patch guard version 2[EB/OL].http://www.uninformed.org/?v=6& a=1&t=sumry,2013.
  • 4Skywing. Patch guard reloaded[EB/OL].http://uninformed.o rg/?v=8&a=5&t=sum ry,2013.
  • 5Matthew Conover. Assessment of Windows Vista Ker-nel-mode security[EB/OL].http://www.symantec.com/avcenter/reference/Window s_ Vista _ Kernel_M ode_Security.pdf,2013.
  • 6Fyyre. Disable Patch guard & driver signing on X64 windows 7+ SP1[EB/OL].http://fyyre.ivory-tower.de/projects/no_pg_ds_v3.rar,2013.
  • 7微软官方.Windows 7 code integrity (ci.dll) security policy.
  • 8韩卓,冉晓旻,吕文高.Windows7内核完整性验证机制研究[J].信息工程大学学报,2011,12(6):764-768. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部