Font Size: a A A

Research Of Trusted Measurement Based On TPM

Posted on:2016-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:L B ZengFull Text:PDF
GTID:2308330461492686Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The 21st century is the age of information. On the one hand, the rapid development of information technology and industry show unprecedented prosperity. On the other hand, information security incidents continue to occur, information situation is severe. Faced with the grim situation of computer network and information security, most of the information security systems mainly consist of passive defensive technical measures such as firewall intrusion detection and virus protection software, etc, did not get a very good results. Through long-term practice summary, people gradually began to realize that only from underlying hardware and software start to take measure, it is possible to construct a information system of high security. Form this though, Trusted Computing technology have emerged and developed rapidly.In this paper, starting from the idea of trusted computing, study the computer system security issues, Trusted Computer System architecture and propose a new trusted measurement scheme based on the TPM. The scheme can solve the TOC-TOU defect of traditional mechanism, can detect the operation of the whole process, can identity suspicious behavior of computer, can ensure the computer system security. Computer security is a hot issure of computer technology, it ont only affect the further development of computer technology, but also pose a threat to people and property, it is of great significance to rasearch on computer security.The work and main innovations of this paper are following:1:Propose a dynamic measurement scheme basing on TPM. This scheme can effectively detect the whole operation of computer running, can solve the TOC-TOU defect of tradition mechanism, can effectively defence buffer overflow attacks.Through experiments show that the scheme has work well and played a certion affect.2:Through in-depth research, try to combine of trusted computing technology and traditional information security technology to build a more secure, reliable information systems. Research mainly focused on secure operating system and virtualization technology.3:Implement a traditional TCG standard trusted chain based on embedded board and linux system, through actual operation study the traditional credible chain technology in more depth, summary and discuss the technical flaws in trusted chain, and propose own solution.
Keywords/Search Tags:Trusted Computing, Trusted Measurement, Secure Operating System, Virtualization Technology
PDF Full Text Request
Related items