《電子技術(shù)應(yīng)用》
您所在的位置:首頁 > 其他 > 设计应用 > 基于长短码联合控制的程序完整性校验方法
基于长短码联合控制的程序完整性校验方法
信息技术与网络安全
姬一文,杨 钊,王玉成,杨诏钧,康 昱
(麒麟软件有限公司,湖南 长沙410000)
摘要: 提出了一种基于长短码联合度量的程序完整性校验方法。分析了操作系统文件系统的特点,基于LSM框架设计文件监控模块,实现对文件完整性实时标记,可主动标记识别被篡改文件;应用程序安装到操作系统时,会对该程序计算哈希值和设定短码标记,来初始化白名单数据库完成度量基准的设定;应用程序执行前触发校验模块,先检测程序的短码标记,根据检测结果再决定对程序的哈希值长码校验。使用应用程序长短码联合度量校验,提高应用程序度量校验效率;结合监控模块对程序的实时监控,并针对不同场景,设计了应用程序的标记在多种类别之间的转换规则,保证快速精细地获取程序完整的状况。整套方案实现了对应用程序实时高效的控制。
中圖分類號: TP309
文獻(xiàn)標(biāo)識碼: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,楊釗,王玉成,等. 基于長短碼聯(lián)合控制的程序完整性校驗方法[J].信息技術(shù)與網(wǎng)絡(luò)安全,2021,40(4):1-6.
Program integrity verification method based on combined control of long and short codes
Ji Yiwen,Yang Zhao,Wang Yucheng,Yang Zhaojun,Kang Yu
(Kylin Software Co.,Ltd.,Changsha 410000,China)
Abstract: This paper proposes a program integrity verification method based on the combined measurement of long and short codes. It analyzes the characteristics of the operating system file system, designs a file monitoring module based on the LSM framework, realizes real-time marking of file integrity, and can actively mark and identify tampered files. When the application program is installed in the operating system, the program will calculate the hash value and set the short code mark to initialize the white list database and to complete the measurement benchmark setting. The verification module is triggered before the application program is executed, and the short code of the program is detected first, and then the long code verification of the hash value of the program is determined according to the detection result. Using the long and short code of the application to measure and verify the application can improve the efficiency of application measurement and verification; combining the monitoring module to monitor the program in real time, and designing the conversion rules between the various categories of application tags in different scenarios to ensure rapid obtain the complete status of the program in a precise manner,the entire program realizes real-time and efficient control of the application.
Key words : integrity verification;integrity measurement;LSM;executive control Network and Information Security

0 引言

隨著計算機(jī)的普及,人們每天都通過計算機(jī)和互聯(lián)網(wǎng)獲取信息、進(jìn)行各種活動,信息技術(shù)已經(jīng)成為人們生活中不可分割的一部分。但計算機(jī)與網(wǎng)絡(luò)空間并不總是安全的,在給人們帶來便利的同時也會帶來巨大的安全威脅。病毒、木馬等非法或惡意代碼是通過篡改或替換系統(tǒng)應(yīng)用程序而達(dá)到對系統(tǒng)進(jìn)行攻擊,進(jìn)而試圖進(jìn)入系統(tǒng)以獲取其非法目的。傳統(tǒng)常規(guī)的安全防護(hù)手段已無法實時保障計算機(jī)的安全可靠,需要一種可靠、高效和實時的完整性度量校驗機(jī)制來解決存在的問題。




本文詳細(xì)內(nèi)容請下載:http://www.ihrv.cn/resource/share/2000003470




作者信息:

姬一文,楊  釗,王玉成,楊詔鈞,康  昱

(麒麟軟件有限公司,湖南 長沙410000)


此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。