《电子技术应用》
您所在的位置:首页 > 其他 > 设计应用 > 基于长短码联合控制的程序完整性校验方法
基于长短码联合控制的程序完整性校验方法
信息技术与网络安全
姬一文,杨 钊,王玉成,杨诏钧,康 昱
(麒麟软件有限公司,湖南 长沙410000)
摘要: 提出了一种基于长短码联合度量的程序完整性校验方法。分析了操作系统文件系统的特点,基于LSM框架设计文件监控模块,实现对文件完整性实时标记,可主动标记识别被篡改文件;应用程序安装到操作系统时,会对该程序计算哈希值和设定短码标记,来初始化白名单数据库完成度量基准的设定;应用程序执行前触发校验模块,先检测程序的短码标记,根据检测结果再决定对程序的哈希值长码校验。使用应用程序长短码联合度量校验,提高应用程序度量校验效率;结合监控模块对程序的实时监控,并针对不同场景,设计了应用程序的标记在多种类别之间的转换规则,保证快速精细地获取程序完整的状况。整套方案实现了对应用程序实时高效的控制。
中图分类号: TP309
文献标识码: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,杨钊,王玉成,等. 基于长短码联合控制的程序完整性校验方法[J].信息技术与网络安全,2021,40(4):1-6.
Program integrity verification method based on combined control of long and short codes
Ji Yiwen,Yang Zhao,Wang Yucheng,Yang Zhaojun,Kang Yu
(Kylin Software Co.,Ltd.,Changsha 410000,China)
Abstract: This paper proposes a program integrity verification method based on the combined measurement of long and short codes. It analyzes the characteristics of the operating system file system, designs a file monitoring module based on the LSM framework, realizes real-time marking of file integrity, and can actively mark and identify tampered files. When the application program is installed in the operating system, the program will calculate the hash value and set the short code mark to initialize the white list database and to complete the measurement benchmark setting. The verification module is triggered before the application program is executed, and the short code of the program is detected first, and then the long code verification of the hash value of the program is determined according to the detection result. Using the long and short code of the application to measure and verify the application can improve the efficiency of application measurement and verification; combining the monitoring module to monitor the program in real time, and designing the conversion rules between the various categories of application tags in different scenarios to ensure rapid obtain the complete status of the program in a precise manner,the entire program realizes real-time and efficient control of the application.
Key words : integrity verification;integrity measurement;LSM;executive control Network and Information Security

0 引言

随着计算机的普及,人们每天都通过计算机和互联网获取信息、进行各种活动,信息技术已经成为人们生活中不可分割的一部分。但计算机与网络空间并不总是安全的,在给人们带来便利的同时也会带来巨大的安全威胁。病毒、木马等非法或恶意代码是通过篡改或替换系统应用程序而达到对系统进行攻击,进而试图进入系统以获取其非法目的。传统常规的安全防护手段已无法实时保障计算机的安全可靠,需要一种可靠、高效和实时的完整性度量校验机制来解决存在的问题。




本文详细内容请下载:http://www.chinaaet.com/resource/share/2000003470




作者信息:

姬一文,杨  钊,王玉成,杨诏钧,康  昱

(麒麟软件有限公司,湖南 长沙410000)


此内容为AET网站原创,未经授权禁止转载。