A Dynamic Integrity Measurement Scheme Based on XEN

Article Preview

Abstract:

A trusted computing platform is designed based on XEN virtual machine, and a dynamic integrity measurement scheme is presented using hypercall mechanism. This scheme can solve the deficiency of limited scope or complicated structure comparing with other dynamic integrity measurement schemes.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 482-484)

Pages:

279-286

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] LIU Weipeng, HU Jun, FANG Yanxiang, SHEN Changxiang. Research and Development on the Secure Architecture of Terminal Based on Trusted Computing. Computer Science(2007), 34(10):257-263.

Google Scholar

[2] ZHANG Huanguo, LUO Jie, JIN Gang, ZHU Zhiqiang. Development of Trusted Computing Research. Wuhan University Journal(2006), 52(5):513-518.

DOI: 10.1007/bf02831786

Google Scholar

[3] Trusted Computing Group. TCG Specification Architecture Overview Revision1.4, http://www.trustedcomputinggroup.org (2007).

Google Scholar

[4] TAN Liang, XU Zhiwei. Development of the Transitive Trusted Chain Based on TPM. Computer Science (2008), 35(10):15-18.

Google Scholar

[5] ZHANG Liqiang, ZHANG huangguo, ZHANG Fan. Trusted Measurement Mechanism in Trusted Computing. Beijing Industry University Journal (2010),36(5):586-591.

Google Scholar

[6] Xin CHEN, Zhigang SI. Research and Design of Dynamic Integrity Measurement in Trusted Computing. Proceedings of 2010 International Conference on Educational and Information Technology, (V3)193-196.

DOI: 10.1109/iceit.2010.5608393

Google Scholar

[7] Reiner Sailer,Xiaolan Zhang,Trent Jaeger,Leendert van Doorn.Design and Implementation of a TCG-based Integrity Measurement Architecture.Proceedings of the 13th USENIX Security Symposium.USENIX,(2004), pp.223-238.

Google Scholar

[8] Trent Jaeger,Reiner Sailer,Unesh Shankar.PRIMA:Policy-Reduced Integrity Measurement Architecture. Proceeding of the 11th ACM Symposium on Access Control Models and Technologies.ACM (2006), pp.19-28.

DOI: 10.1145/1133058.1133063

Google Scholar

[9] Xinwen Zhang,Songqing Chen,Michael J.Covington,Ravi Sandhu.SecureBus:Towards Application-Transparent Trusted Computing with Mandatory Access Control.ASIACCS'07 (2007).

DOI: 10.1145/1229285.1229304

Google Scholar

[10] GAO Li, QIN Xi, CHANG Chaowen, CHEN Xin. A Embedded System-based Computing Platform for Tolerating Untrusted Component. Wuhan University Journal (2010), 35(5):626-629.

Google Scholar

[11] Shankar U,Jaeger T,Sailer R.Toward automated information-flow integrity for security-critical applications.Proceedings of the 13th Annual Network and Disributed Systems Security Symposiun. Internet Society (2006).

Google Scholar

[12] Garlinkel T,Pfaff B,Chow J,Rosenblum M,Boneh D.Terra:a virtual machine-based platform for trusted computing.Proceeding of the 19th ACM Symposium on Operating systems principles.ACM (2003),pp.193-206.

DOI: 10.1145/945445.945464

Google Scholar

[13] SHI Lei, ZOU Deqing, JIN Hai. Xen Virtualization Technique. Wuhan:HuaZhong Science and Technology University Publisher (2009).

Google Scholar

[14] Mark Thober, J. Aaron Pendergrass, C. Durward McDonell. Improving Coherency Of Runtime Integrity Measurement. STC'08 (2008).

DOI: 10.1145/1456455.1456464

Google Scholar