Font Size: a A A

Research On Function Model Of Trusted Computing Mechanism In Vista

Posted on:2009-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:W GaoFull Text:PDF
GTID:2178330338485578Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Traditional computer architecture emphasizes too particularly on open standards, usability and efficiency, which is the reason why it lacks of security. Windows Vista uses a lot of trusted computing technology to enhance its security. Therefore, it is necessary for security evaluation to apply reverse analysis with trusted computing technology. The aim of the thesis is that researching on building trusted computing function model technology, and setting the trusted computing function model of Vista.The thesis analyzes existed methods of reverse engineering and tools of reverse analysis, researches on reverse analysis with trusted computing technology of Vista, presents a reverse analysis and crack-found methodology with the functional model as the centre for Vista trusted mechanism, pays attention to the functional model establishing of binary code and the description methodology. And it designs general XML-based storage structure to serve the storage and transformation of information cross levels in the level functional model of trusted mechanism, develops the plugin of IDA, which takes and stores routine CFG and level functional model automatically from the binary code.The thesis analyzes the trusted mechanism within Vista by use of the reverse functional model establishing method and the analyzing method proposed in this thesis. Then locate and extract the codes which realize the mechanism from Vista, and describe their implementation, basic work flow as well as the key functions implementation progress. Finally, the functional models of code integrity validation in Vista, the trusted chain and Full Volume Encryption security storage are established. The thesis aim is achieved.
Keywords/Search Tags:Reverse analysis, Function model, Trusted computing, Integrity Validation, Trusted chain, Full volume encryption, XML, Vista
PDF Full Text Request
Related items