Font Size: a A A

Based On Trusted Computing Embedded Platform Kvm Research And Improvement

Posted on:2008-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:D J DingFull Text:PDF
GTID:2208360212999684Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Recently, many researches have been done in the java class file and virtual machine, and also many mechanisms have been proposed to protect the Java class file,they do work in some degree, such as JIT,code isolation, code obfuscation and codewatermaking. However, all these mechanisms have their limitations respectively.Trusted computing technology has become a hot topic in the field of information security, which advances the ability of businesses, government agencies and consumers to conduct trustworthy transactions.Firstly,the models of KVM was analyzed deeply which include class loading model,class verify model, memory management and garbage collect model, thread management model and executing model. Java internal running system was disclosed by detailing the main function of the models, the execute flow, and the relation ship of the models. Then, a simple and efficient mechanism was designed and implemented to protect the java class file in this thesis, based on trusted computing technology. The new mechanism has some main features as below:(1) The java class files are encrypted and decrypted by using the the TPM(trusted computing module) .(2) The improved cIassloader model was used to load the decrypted class file instead of the default java virtual machine.Finally, a partition of porting layers was brought forward which include java application management interface, J2ME kernel interface and J2ME abstract interface,makes the porting course more standardization.Increasing the porting efficiency.
Keywords/Search Tags:trusted computing, classLoader, KVM, trusted computing module, porting
PDF Full Text Request
Related items