首页 | 本学科首页   官方微博 | 高级检索  
     


A trusted environment construction method for security-sensitive software
Authors:Jing Li  Huanguo Zhang  Bo Zhao  Lingling Fang
Affiliation:LI Jing1,2,ZHANG Huanguo1,ZHAO Bo1,FANG Lingling1,2 1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China,2.Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education
Abstract:This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively prevents memory dumping and memory tampering for the high-sensitivity data.The file m...
Keywords:information security  trusted computing  security-sensitive software  trusted environment  
本文献已被 CNKI SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号