节点文献
基于策略的语义远程认证
Policy Based Semantic Remote Attestation
【作者】 屈军瑞;
【导师】 彭新光;
【作者基本信息】 太原理工大学 , 计算机应用技术, 2010, 硕士
【摘要】 随着互联网的高速发展,网络对安全保障提出了更高的要求。传统的安全技术主要是通过修补漏洞、安装防火墙、防御外部攻击等防御手段来抗击计算机外部的病毒、黑客的攻击和入侵,但这些不能从根本上解决计算机网络的安全。事实上,所有计算机入侵攻击都是从个人计算机终端上发起的。因此,网络安全技术就要从另一个角度来解决安全问题,那就是直接保护终端计算机的安全,从终端出发确保网络资源的安全来实现整个网络安全。可信计算技术就是为了解决这些问题而日益成为网络安全领域研究的一个新热点。同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。目前,在TCG规范中只针对操作系统加载前系统初始引导阶段的信任的建立与传递作出了描述,为了实现在系统中将信任传递扩展到应用程序。本文在TCG规范的基础上继续构建一条完整信任链,它是基于java虚拟机设计的一条从硬件到软件的完整信任链,最终实现java程序的可信执行环境。本文分析了信息安全技术的现状和发展要求,阐明了终端安全研究的思路和技术发展方向,详细介绍了TCG提出的可信计算的概念,构成和目前的研究进展情况。另外,还介绍了可信JVM,它修改了java程序的启动执行流程,结合了可信PC硬件平台、Linux操作系统以及java程序运行时环境JRE6,构建成的一条完整的信任链。该信任链中使用可信平台模块提供的密码服务和安全存储功能,在应用程序模块加载执行前插入控制点实现完整性状态信息的度量验证技术。在该环境中可以避免非信任软件或者被非法篡改的信任软件执行,从而防止恶意软件的攻击或者病毒传播。在分析完可信JVM之后,我们研究了远程认证,因为远程认证在可信计算中起着重要作用,它能提供可信环境存在的可靠证据。目前的方法是测量目标平台的二进制码、配置文件、属性或者安全策略等可信值。所有这些认证方法是静态的,缺乏动态行为认证并且没有对于实际的行为进行说明和规范。为了改进和完善这些认证方式,本文提出了一种语义远程认证策略,并对其进行了定义、规范和证明。该策略是把使用控制模型和行为结合起进行远程认证。该认证技术并不是静态的,也不是仅仅在初次连接时认证一次,而是进行持续的、动态的认证,而且它还对客户端的各个方面都进行安全性的评估,还时刻监视端点的行为。在此远程认证设计中,为了保证运行环境的可信,采用了可信JVM作为实验平台,从而实现了一种与平台无关的语义远程认证。
【Abstract】 With the fast development of Internet, it is required safer protection. The traditional safety technologies, such as modifying loopholes, installing firewalls, defending outside attacks, are used to stand against the virus and Hacker attacks, however, But these can not fundamentally solve the security of computer networks.The real reason is that all the attacks are stem from the terminal of personal computer. Therefore, we should solve these problems from other perspectives. We should protect the terminal of personal computers directly, it means that, we use new security technology to protect the terminal to make the whole net safe. As mention above, we concern on the new safety technology in the information security field. Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy. They don’t want the others know their real identities.Now, In the TCG specification only for the operating system describe the system loads the initial boot phase of confidence-building and transfer. In order to achieve confidence in the system and extend to the application.In this paper, we establish the software part of the chain of trust building process which is basesd on TCG specifications. A whole chain of trust from hardware to software based on java virtual machine is designed, and eventually the trustworthy java application execution environment is realized. In the thesis, current security technology and requirements for its development is analyzed, and the concept, architecture and current research progress of TCG are discussed in details. Another, also introduce the trust JVM, It modified java program’s start-up and running procedure, a complete chain of trust is constructed by trustworthy personal computer platform, Linux operation system, and java runtime environment 6. And eventually an authenticated execution of java application is realized by Trusted JVM. Through the use of cryptography services and storage capabilities provided by trusted platform module, inserting control points before application module loading, the integrity information is measured and verified in the process of building, after the chain of trust system is tested under real environment, the trustworthy of this system if proved. In this environment the untrustworthy software or trustworthy software which is illegal tampered can’t be executed. And thus malicious attacks or spreading of viruses is avoided.After analyzing the trust JVM, we study remote attestation. Because remote attestation plays an important role in trusted computing, which can provide reliable evidence for existence of a trusted environment. Existing approaches for the realization of remote attestation measure the trustworthiness of a target platform from its binaries, configurations, properties or security policies. All these approaches are static, and none of them define what a trusted behavior actually is and how to specify it. In this paper, we propose a novel attestation policy, which is based on the behavior. This policy associate usage control and behavior. The attestation technology is not static and do not verify once only at the beginning of connection, but dynamic and constant. It assesses the security of every aspect of terminal host. In the design of the remote attestation, in order to ensure the executing environment is trusted, we use trust JVM for experimental platform, so achieve a platform-independent semantic remote authentication.
【Key words】 network security; trusted computing remote attestation; semantic remote attestation policy;