检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王镇道[1] 郑荣浩[1] 张立军[2] 鲁辉[2]
机构地区:[1]湖南大学物理与微电子科学学院,湖南长沙410082 [2]中国科学院微电子研究所,北京100029
出 处:《计算机应用与软件》2016年第1期230-234,258,共6页Computer Applications and Software
基 金:国家重点基础研究发展计划项目(2010CB327506);中央高校基本科研业务费项目;湖南省科技计划项目(2014FJ3155)
摘 要:针对嵌入式平台的安全问题,提出一种基于可信计算技术的嵌入式终端可信安全方案。采用可移动的启动存储介质作为核心可信度量根的带双启动模式的混合型信任链结构,缩短根节点到每个节点在信任链上的距离;采用预计算摘要值法度量节点完整性;简化并移植在PC平台上的可信软件协议栈;提出嵌入式可信网络接入机制,从而实现了嵌入式终端可信环境的建立。最后实验结果表明,该方案可以在启动中检测出代码是否被篡改,且启动时间开销相比于普通可信启动减少约15.8%,因此可基本上保证终端的安全性。We proposed a trusted computing technology-based trusted security solution for embedded terminals in light of the safety of embedded platforms. We used a hybrid chain of trust structure, which has dual-boot mode and uses movable storage media as the root of core trust measurement, to reduce the distance between each node to the ,root node in the trust chain; We used pre-computed summary method to measure the node integrity, simplified and transplanted the trusted software stack on PC platform, and at last concluded an embedded trusted network access mechanism, so that achieved the establishment of trusted environment of embedded terminals. Final experimental results showed that the solution could detect whether the startup code had been tampered, and compared with ordinary credible start, the time overhead decreased 15.8% , therefore it was able to basically ensure the safety of terminals.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.112