• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 论文 • 上一篇    下一篇

嵌入式系统可信虚拟化技术的研究与应用

张伶俐,张功萱,王天舒,程翔   

  1. (南京理工大学计算机科学与工程学院,江苏 南京 210094)
  • 收稿日期:2016-04-20 修回日期:2016-06-13 出版日期:2016-08-25 发布日期:2016-08-25
  • 基金资助:

    国家自然科学基金(61272420)

Trusted virtualization technology in embedded system and its application    

ZHANG Ling-li,ZHANG Gong-xuan,WANG Tian-shu,CHENG Xiang   

  1. (School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China)
  • Received:2016-04-20 Revised:2016-06-13 Online:2016-08-25 Published:2016-08-25

摘要:

嵌入式系统在生活中的应用日益广泛,传统的安全增强手段已无法有效应对各种安全问题,增强嵌入式系统的安全性成为目前亟需解决的问题。为提高嵌入式系统及其应用程序的安全性,结合嵌入式系统的虚拟化技术与可信计算技术,设计并实现基于虚拟TCM的可信计算平台框架,实现了虚拟TCM和基于虚拟TCM的可信增强技术,提出并实现了一个基于虚拟TCM的会话认证方法,将信任链从硬件操作系统层扩展到了虚拟域的应用软件层。实验结果表明,虚拟TCM与物理TCM相结合能够有效保证嵌入式系统、虚拟域和应用程序的安全可信。

关键词: 信任链, 虚拟化, 可信密码模块

Abstract:

Embedded systems have increasingly extensive applications in all fields. However, traditional security enhancement methods are unable to deal with various security issues. How to enhance the security of embedded systems becomes an urgent problem to be solved. In order to improve the security of embedded systems and promote their applications, we design and implement a trusted computing platform framework based on virtual trusted cryptography module, and the virtual trusted cryptography module and the trusted enhancement technology based on it are realized. We also propose and implement a session authentication method based on the virtual trusted cryptography module, extending the trust chain from the hardware operating system layer to the application software layer in the virtual domain. Experimental results show that the combination of the virtual trusted cryptography module and the physical trusted cryptography module can effectively ensure the security of embedded systems, virtual domains and applications.

Key words: trust chain, virtualization, trusted cryptography module