期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Formal Analysis of Trusted Platform Module Commands for Compromising User Key 被引量:2
1
作者 Qin Yu Zhao Shijun Zhang Qianying 《China Communications》 SCIE CSCD 2012年第10期91-102,共12页
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec... The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys. 展开更多
关键词 trusted computing TPM TPM command applied pi calculus Api analysis
在线阅读 下载PDF
形式化分析基于WebID的网络访问控制协议WAC安全性 被引量:1
2
作者 段品旭 陆正柱 《科学技术创新》 2023年第9期116-120,共5页
近些年,为了提高身份验证的安全性以及加强网络资源的访问控制的管理,人们引入了多种身份安全协议。由于身份验证已经成为一个热点问题,因此,首先介绍了基于WebID的网络访问控制,其次利用Applied PI演算对于基于WebID的网络访问控制进... 近些年,为了提高身份验证的安全性以及加强网络资源的访问控制的管理,人们引入了多种身份安全协议。由于身份验证已经成为一个热点问题,因此,首先介绍了基于WebID的网络访问控制,其次利用Applied PI演算对于基于WebID的网络访问控制进行形式化建模,再次把形式化建模转化为ProVerif的输入,最后运行ProVerif分析了基于WebID的网络访问控制。结果表明,该方法具有一定的认证能力。 展开更多
关键词 applied pi 访问控制 认证 ProVerif 安全协议
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部