J4 ›› 2011, Vol. 33 ›› Issue (6): 21-25.doi: 10.3969/j.issn.1007130X.2011.
• 论文 • Previous Articles Next Articles
CHEN Songzheng,WEI Lifeng
Received:
Revised:
Online:
Published:
Abstract:
The trusted path provides a way for users to authenticate computer systems so that they are assured the systems are not tampered and malicious code such as Trojan Horses couldn't steal their passwords or intercept their sessions. The paper first puts forward a complete design of trusted paths, which aims at Unixlike operating systems and consists of two parts: trusted login and trusted session, and both parts should handle the situations of console interface and graphical interface respectively. And also in accordance with the trusted path, an operating system is divided into four states and a secure attention key will lead to state transitions. With the relation of these states, the design can be more easily mapped into real operating systems. And then the paper gives an implementation through a secure attention key which invokes a trusted path between the user and the system in the FreeBSD operating system. With the trusted paths, FreeBSD can provide a much more secure operating environment for its users.
Key words: trusted path;secure attention key(SAK);trusted session console;Unixlike operating system
CHEN Songzheng,WEI Lifeng. Design and Implementation of Trusted Paths[J]. J4, 2011, 33(6): 21-25.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/10.3969/j.issn.1007130X.2011.
http://joces.nudt.edu.cn/EN/Y2011/V33/I6/21