A trusted environment construction method for security-sensitive software |
| |
Authors: | Jing Li Huanguo Zhang Bo Zhao Lingling Fang |
| |
Affiliation: | LI Jing1,2,ZHANG Huanguo1,ZHAO Bo1,FANG Lingling1,2 1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China,2.Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education |
| |
Abstract: | This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively prevents memory dumping and memory tampering for the high-sensitivity data.The file m... |
| |
Keywords: | information security trusted computing security-sensitive software trusted environment |
本文献已被 CNKI SpringerLink 等数据库收录! |
|