• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (6): 21-25.doi: 10.3969/j.issn.1007130X.2011.

• 论文 • Previous Articles     Next Articles

Design and Implementation of Trusted Paths

CHEN Songzheng,WEI Lifeng   

  1. (School of Computer Science,National University of Defense Technology,Changsha 410073,China)
  • Received:2009-05-12 Revised:2009-08-26 Online:2011-06-25 Published:2011-06-25

Abstract:

The trusted path provides a way for users to authenticate computer systems so that they are assured the systems are not tampered and malicious code such as Trojan Horses couldn't steal their passwords or intercept their sessions. The paper first puts forward a complete design of trusted paths, which aims at Unixlike operating systems and consists of two parts: trusted login and trusted session, and both parts should handle the situations of console interface and graphical interface respectively. And also in accordance with the trusted path, an operating system is divided into four states and a secure attention key will lead to state transitions. With the relation of these states, the design can be more easily mapped into real operating systems. And then the paper gives an implementation through a secure attention key which invokes a trusted path between the user and the system in the FreeBSD operating system. With the trusted paths, FreeBSD can provide a much more secure operating environment for its users.

Key words: trusted path;secure attention key(SAK);trusted session console;Unixlike operating system