期刊文献+

嵌入式操作系统进程监测器的设计与实现

Design and Implementation of Process Inspector for Embedded Operating System
在线阅读 下载PDF
导出
摘要 为避免嵌入式操作系统的进程受到恶意软件的修改破坏,提出一种适合于嵌入式操作系统的进程监测器。监测器周期性地对系统进程控制块进行检测恢复,通过设置进程检查点为系统提供恢复操作进程,并在Linux上进行实现,给出主要的数据结构和实现过程。实验结果表明,监测器的运行对系统性能影响小,能对系统进程进行有效的检测恢复。 In order to protect the process in kernel from attack,a process inspector for embedded system is designed and implemented.The process inspector periodically detects and recovers the system inconsistency.This protection method can provide recovery actions for the system which is based on checkpoint and recovery technique.It realizes in Linux and gives experimental result and analysis.Experimental results show the the inspector can correctly detect and recover the system inconsistency with acceptable penalty to the system performance.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第9期59-61,共3页 Computer Engineering
基金 "核高基"重大专项"核心电子器件 高端通用芯片及基础软件产品"(2009ZX01039-003-001-002) 国家"863"计划基金资助项目(2007AA01Z131)
关键词 进程监测器 安全攻击 检测点 检测恢复 process inspector security attack checkpoint detection recovery
  • 相关文献

参考文献9

  • 1Paul H H,Jason C D.Berkeley Lab Checkpoint/restart(BLCR) for Linux Clusters[J].Journal of Physics,2006,46(3):494-499.
  • 2李毅,周明天.Minix进程检查点机制的实现[J].计算机应用,2003,23(1):13-14. 被引量:4
  • 3Annenbaum T,Litzkow M.The Condor Distributed Processing System[J].Dr.Dobb's Journal,1995,25(2):40-48.
  • 4Chen Chih-Ho,Ting Yung.Low Overhead Incremental Checkpointing and Rollback Recovery Scheme on Windows Operating System[C]//Proc.of the 3rd International Conference on Knowledge Discovery and Data Mining.Phuket,Thailand:[s.n.],2010.
  • 5于淑英,黄皓,刘国斌.微内核完整性保障研究与应用[J].计算机科学,2009,36(1):247-251. 被引量:2
  • 6Garfinkel T,Rosenblum M.A Virtual Machine Introspection Based Architecture for Intrusion Detection[C]//Proc.of Network and Distributed Systems Security Symposium.San Diego,USA:[s.n.],2003.
  • 7杨晖,陈闳中.支持文件迁移的Linux检查点机制的实现[J].计算机工程,2010,36(3):266-268. 被引量:4
  • 8门朝光,焦亮,李香,徐振朋.基于Linux内核的进程检查点系统设计与实现[J].计算机科学,2009,36(4):192-194. 被引量:5
  • 9Demsky B,Rinard M.Automatic Detection and Repair of Errors in Data Structures[C]//Proc.of the 18th Annual ACM SIGPLAN Conference on Object-oriented Programming,Systems,languages,and Applications.Anaheim,California,USA:[s.n.],2003.

二级参考文献38

  • 1戴永涌.基于Myrinet的检查点一致性设计与实现[J].计算机工程,2005,31(22):78-80. 被引量:1
  • 2杨季文 等.80x86 汇编语言程序设计教程[M].北京:清华大学出版社,2001..
  • 3Tanenbaum AS Woodhull AS.OPERATING SYSTEMS:Design and Implementation:影印版, 第二版[M].北京:清华大学出版社, PRENTICE HALL Inc,1998..
  • 4Bell D E, LaPadula L J. Secure Computer System: Unified Exposition and MULTICS. Interpretation. MTR 2997 Rev. 1, The MITRE Corporation, Bedford, MA, USA, Mar. 1976
  • 5Flink II C W,Weiss J D. System V/MLS Labeling and Mandatory Policy Alternatives. AT&T Technical Journal, May/June 1988:53-64
  • 6Limoges C G, Nelson R R, Heimann J H, et al. Versatile integrity and security environment (VISE) for computer systems// Proceedings of the 1994 Workshop on New Security Paradigms. Little Compton, Rhode Island, 1994:109-118
  • 7Secure Computing Corporation. Assurance in the Fluke Microkernel: Formal Security Policy Model. CDRL Sequence No. A003,Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113, Feb. 1999
  • 8Loscocco P,Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating System. Technical report. NSA and NAI labs,Jan. 2001
  • 9Anderson J P. Computer Security Technology Planning Study. Volume Ⅱ. ESDTR-73-51, Vol. Ⅱ, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA, USA,Oct. 1972
  • 10Herder N, Bos H, Tanenbaum A S. A lightweight method for building reliable operating systems despite unreliable device drivers. Technical Report IR CS-018. Jan. 2006

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部