节点文献

基于可信计算技术的移动代码安全研究

Mobile Code Security Based on Trusted Computing Technology

【作者】 刘巍伟

【导师】 沈昌祥;

【作者基本信息】 北京交通大学 , 信息安全, 2009, 博士

【摘要】 互联网的飞速发展使移动代码及相关技术得到了极大的发展,广泛存在的诸如“动态内容(Active Contents)”、“脚本语言(Scripting)”、“宏(Macro)”、“应用程序(Applet)”、“自定义控制(Custom Control)”等,这类代码被统称为“移动代码”。由于移动代码的移动性、动态性和多态性,在给用户带来方便性的同时,移动代码所引发的安全问题也突现。关于移动代码的安全一直是难以解决的问题,特别是在对安全要求较高的环境中,安全问题严重影响着移动代码的发展和应用。本文主要基于可信计算思想及技术研究如何防范恶意的移动代码对主机资源的破坏以及恶意的主机对于移动代码的攻击。当前,可信计算及其应用已经成为研究热点。可信计算在可信认证、可信度量、可信存储等方面为安全应用支撑平台的建立提供基础支持。按照可信计算技术思路,代码是否可信是基于代码的行为而言的,相比传统的以代码静态特征为依据的检测和防范手段而言,从行为的度量和控制方面研究移动代码的安全能够弥补传统技术的不足,符合信息安全的发展趋势。目前可信计算平台对于应用支持方面的研究仍存在很多值得研究的问题,本文所探讨的基于可信计算技术的移动代码安全保护就是其中一个方面,在此方面所做的探讨和研究也将对可信计算技术的进一步推广产生积极效应。本文综述了移动代码的特征以及由此引发的安全问题,分析当前研究中存在的问题和不足之处,指出现有的静态特征码扫描技术在恶意移动代码变体以及未知类型移动代码识别方面已经存在明显缺陷和短板,要解决未知移动代码的安全防护问题必须以可信计算平台技术为基础,以移动代码的行为特征为核心,构筑主动防御体系。在信息安全保障“一个中心三重防护体系”框架下,本文针对移动代码安全提出了一个三重防护模型,以代码行为特征为基本出发点,试图从移动代码来源控制、移动代码可信验证以及移动代码行为控制三个层面建立移动代码安全的综合防御体系,并对其中的关键技术进行重点研究。具体来说,本文在以下方面进行了较为深入的研究。1)以源头控制为主导思想,对移动代码的来源平台进行度量和证明,提出一种基于终端行为特征的可信网络连接控制方法,将终端行为特征作为度量指标,与其它方法相比能够更加实时和准确地反映平台状态,并实时地将恶意主机阻断在网络环境之外,从源头有效控制恶意移动代码的入侵。2)移动代码“生产平台”和“消费平台”之间的信任关系建立有助于对移动代码消费平台的保护,结合自动信任协商ATN技术,依靠逐步披露的平台身份证书和行为属性证书,在陌生的移动代码生产者和移动代码消费者之间建立信任关系,该方法不仅解决了跨域平台的信任建立难题,同时保护了平台属性等隐私信息。3)当移动代码消费平台接收到外来的移动代码时,对其进行检测和验证是抵御恶意移动代码攻击的重要环节,为此本文首次提出了以移动代码宿主解释进程的综合行为特征为依据的移动代码检测和判定方法。通过引入攻击树模型描述代码在执行过程中生成和调用的所有中间代码以及目标代码的逻辑关系,计算得到移动代码恶意性权值,进而对代码是否可信作出判别。实验表明相对于已有的静态特征识别方法和行为特征序列识别方法,本文提出的方法具有极低的漏报率和误报率,并且对于未知恶意代码的识别具有积极意义。4)针对移动代码存在的不同形态,对其行为实施有效控制,把系统中的所有主客体划分为已标识域和未标识域,在生产系统中对移动代码实施标记,通过访问控制机制明确限定代码能够访问的资源范围,实现主机平台对恶意移动代码的“自免疫”。对于无法准确标记以及开放网络环境下的移动代码,提出了一种面向可信标识对象的移动代码访问控制模型,该模型以“管道封装”思想为基础,通过对移动代码及其相关资源的封装,限定代码的作用范围,同时通过对代码的可信状态进行区分,限制不可信的以及不确定的移动代码对本地资源的威胁。5)基于可信计算平台技术以及密封存储机制,对移动代码所携带资源实施密封(Seal)保护,使得只有授权的用户在授权的终端平台上才能够通过解封(UnSeal)得到移动代码和其携带的敏感资源信息的明文,以此保证移动代码中敏感资源的机密性,防止恶意主机平台对于移动代码的篡改和破坏,以及恶意用户对移动代码中敏感信息的窃取。

【Abstract】 With the rapid development of broadband network technology, mobile code technology has a great deal of development and promises well. Oftentimes mobile code takes a variety of forms including active contents,scripting,macro,applet,custom control and so on, these dynamic programs that can move across network are often referred to as "mobile code". However, the security problem with mobile code technology obstructs its wide application in real business. Among these security problems, how to protect mobile code from malicious host and how to protect host platforms from malicious mobile code are new issues that cannot be dealt by traditional technologies. In this thesis, we aim at solving these problems based on trusted computing.Trusted computing is one of the focuses of recent research. According to trusted computing, the trustworthiness of code is based on its behavior rather than static characteristics. It meets the development trend of information security. This thesis firstly applies trusted computing technology to solve the security problems of mobile code. We hope the research work can also promote the application of trusted computing rapidly.The security problems and security requirements in mobile code system are analyzed. It is obviously that the existing malicious code detection algorithms which are based on static characteristics have some drawbacks. We get the conclusion that in order to solve the security problems of unknown mobile codes, we should focus on the trustworthiness of its behavior based on trusted computing technology. In this thesis, we propose a three-level protection model to deal with mobile code security problems. In this model we consider code behavior characteristics as basic starting point, and try to build a comprehensive protection architecture. Main research work and key contributions of this dissertation are as follows:1. Considering source controlling as dominate idea, we propose a trusted network connect control strategy which calculates the "healthy status" of a terminal based on analyzing the real-time characteristics of its behavior and process activity. It protects a network and its internal terminals by checking the identification and "healthy status" of each terminal attempting to access the protected network. Then the external terminal which could be getting potential risk will be isolated from the network. Compared with the existing methods which are based on static characteristics, our strategy can get better performance, especially, on identifying and isolating the terminals with potential risk.2. Automated trust negotiation based Trust Mobile Code Verification Model (ATNMCVM) is proposed in this thesis, which establishes trust between strangers with iterative disclosure of credentials and security policies. In addition, the sensitive property and private privacy can be protected in ATNMCVM.3. Inspired by the research of attack tree model, we present a new malicious code detection algorithm based on behavior characteristics by importing improved attack tree model to describe the entity relationships during the malicious code execution time. It is named IBC-DA. The experiments result shows that the proposed algorithm works in most cases of detection and only has minor errors in few conditions. This algorithm has very positive sense for unknown malicious code detection.4. Combining trusted computing with object-oriented method, we propose a new trust extended object-oriented security model (TEOOSM), which can be applied to the access control system of Mobile Codes. Because mobile codes have strong ability of being independent, autonomic, mobile, and mixed with data, it is ineffective to handle their security issues with traditional access control systems. Our model encapsulates the code and data, utilize the trusted status measurement, and then effectively protect platforms, codes and data from being destroyed by malicious codes or systems.5. Environmental key generation can be used when mobile code producer (MCP) needs mobile code consumer (MCC) to decrypt the code correctly only if some special environmental conditions are true. In this thesis, we introduce a new approach, which is based on environmental key generation, to protect sensitive information within mobile code. It is achieved through introduction of Trusted Computing technology-Sealing. Our approach uses the combination of hardware and software technology, so it is tamper-resistant to attackers.

节点文献中: 

本文链接的文献网络图示:

本文的引文网络