期刊文献+

一种基于Petri网的隐蔽信息流分析方法 被引量:2

A Petri Net Based Approach to Covert Information Flow Analysis
在线阅读 下载PDF
导出
摘要 隐蔽信息流分析是开发高等级可信计算机系统必须面对的问题.以Petri网作为开发安全系统的形式化建模工具,给出Petri网中隐蔽信息流存在的判定条件.提出该条件成立的两种网结构,进而可以在语法层次上预先判断隐蔽信息流的存在性,并使由此类结构引起的隐蔽信息流在系统的设计阶段得以避免.开发了一种基于Petri网可达图的隐蔽信息流存在性判定算法,算法遵循无干扰方法的思想,但是避免了无干扰方法中等价状态的区分和展开定理的使用.另外,算法采用深度优先搜索的策略,避免了Petri网全局可达图的构造.对复杂的安全系统,分析了子系统的各种组合运算对隐蔽信息流存在性的影响,降低了大规模系统分析的复杂度. The covert information flow analysis is a key problem in developing high secure systems. In this paper Petri net is used to model the dynamic behavior of the secure system. A condition characterizing the existence of the covert information flow in Petri net is proposed, and two kinds of net structures are proposed for judging the condition such that the covert information flow could be searched in the structure level. Based on the reachable graph of Petri nets, an algorithm for deciding the condition is proposed, and it follows the idea of noninterference. However, it avoids using the unwinding theorem and distinguishing the equivalent states. In addition, the algorithm is based on the depth first search strategy such that it avoids constructing the global reachable graph. For complex secure systems, we analyze how the composition operating of Petri nets influences the covert information flow such that the complexity of analyzing the large system is reduced.
出处 《计算机学报》 EI CSCD 北大核心 2012年第8期1688-1699,共12页 Chinese Journal of Computers
基金 国家自然科学基金青年基金(61003288) 中德合作交流基金(6111130184) 江苏省自然科学基金(BK2010192) 教育部博士点基金(20093227110005)资助~~
关键词 隐蔽信息流 无干扰 PETRI网 组合 展开定理 covert information flow noninterference Petri net composition unwinding theorem
  • 相关文献

参考文献9

二级参考文献80

  • 1张继军,吴哲辉.Petri网的分层递归模型[J].系统仿真学报,2003,15(z1):89-92. 被引量:11
  • 2蒋昌俊.Petri网的广义笛积运算[J].自动化学报,1993,19(6):745-749. 被引量:23
  • 3吴哲辉.Pumping引理的Petri网描述──Petri网语言属型的一组判定条件[J].计算机学报,1994,17(11):852-858. 被引量:33
  • 4袁崇义.Petri网原理[M].北京:电子工业出版社,1997..
  • 5[1]Lampson BW. A note on the confinement problem. CACM, 1973,16(10):.613~615.
  • 6[2]Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990,16(6):569~580.
  • 7[3]U.S. Department of Defense. Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 1985.
  • 8[4]General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China. Classfied criteria for security protection of computer information system. GB 18859-1999, 1999 (in Chinese).
  • 9[5]Qing SH, Ji QG. Formal model design for secure operating systems. In: ITI 1st Int'l Conf. on Information and Communications Technology. 2003.
  • 10[6]Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983,1(3):256~277.

共引文献256

同被引文献47

  • 1张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 2李晓勇,韩臻,沈昌祥.Windows环境下信任链传递及其性能分析[J].计算机研究与发展,2007,44(11):1889-1895. 被引量:14
  • 3Anupam D, Jason F,Deepak G,et al.A logic of secure systems and its application to trusted computing [ A]. Proceedings of the 30th IEEE Symposium on Security and Privacy [ C]. Washing- ton,DC: IEEE Press,2009.221 - 236.
  • 4Shuanghe P, Zhen H. Enhancing PCsecurity with a U-key [ A]. Proceedings of the IEEE Symposium on Security and Privacy [ C]. Washington, DC: IEEE Press, 2006.34 - 39.
  • 5Wang Z, Jiang X. HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity [ A ]. Proceedings of the 31th IEEE Symposium on Security and Privacy [ C]. Wash- ington,DC: IEEE Press,2010. 380 - 395.
  • 6Weiqi D,Hai J, Deqing Z, et al. TEE:A virtual DRTM based execution environment for secure cloud-end computing [A ]. Proceedings of the 17th ACM Conference on Computer and Communications Security [C]. New York: ACM Press, 2010. 663 - 665.
  • 7Juan D, Wei W, Xiaohui G, et al. RunTest: assuring integrity of dataflow processing in cloud computing infrastructures [ A ].Proceedings of the ACM Symposium on Information, Computer and Communications Security [ C ]. Washington, DC: IEEE Press, 2010.293 - 304.
  • 8Sailer R,Zhang X L, Jaeger T, et al. Design and implementa- lion of an tcg-based integrity measurement architecture [ A ]. Proceedings of the 13th USENIX Security Symposium [C]. Oakland: USENIX Press, 2004. 223 - 238.
  • 9Kauer B. OSLO: Improving thesecufity of trusted computing [ A]. Proceedings of the 16th USENIX Security Symposium [ C]. Oakland: USENIX Press, 2007. 229 - 237.
  • 10Haldar V, Chandra D,Frattz M. Semantic remote atlestation: A virtual machine directed approach to trusted computing [ A ]. Proceedings of USENIX Virtual Machine Research and Tech- nology Symposium [ C ]. Oakland: USENIX Press, 2004.3 - 20.

引证文献2

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部