基于长短码联合控制的程序完整性校验方法
信息技术与网络安全
姬一文,杨 钊,王玉成,杨诏钧,康 昱
(麒麟软件有限公司,湖南 长沙410000)
摘要: 提出了一种基于长短码联合度量的程序完整性校验方法。分析了操作系统文件系统的特点,基于LSM框架设计文件监控模块,实现对文件完整性实时标记,可主动标记识别被篡改文件;应用程序安装到操作系统时,会对该程序计算哈希值和设定短码标记,来初始化白名单数据库完成度量基准的设定;应用程序执行前触发校验模块,先检测程序的短码标记,根据检测结果再决定对程序的哈希值长码校验。使用应用程序长短码联合度量校验,提高应用程序度量校验效率;结合监控模块对程序的实时监控,并针对不同场景,设计了应用程序的标记在多种类别之间的转换规则,保证快速精细地获取程序完整的状况。整套方案实现了对应用程序实时高效的控制。
中圖分類號(hào): TP309
文獻(xiàn)標(biāo)識(shí)碼: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,楊釗,王玉成,等. 基于長(zhǎng)短碼聯(lián)合控制的程序完整性校驗(yàn)方法[J].信息技術(shù)與網(wǎng)絡(luò)安全,2021,40(4):1-6.
文獻(xiàn)標(biāo)識(shí)碼: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,楊釗,王玉成,等. 基于長(zhǎng)短碼聯(lián)合控制的程序完整性校驗(yàn)方法[J].信息技術(shù)與網(wǎng)絡(luò)安全,2021,40(4):1-6.
Program integrity verification method based on combined control of long and short codes
Ji Yiwen,Yang Zhao,Wang Yucheng,Yang Zhaojun,Kang Yu
(Kylin Software Co.,Ltd.,Changsha 410000,China)
Abstract: This paper proposes a program integrity verification method based on the combined measurement of long and short codes. It analyzes the characteristics of the operating system file system, designs a file monitoring module based on the LSM framework, realizes real-time marking of file integrity, and can actively mark and identify tampered files. When the application program is installed in the operating system, the program will calculate the hash value and set the short code mark to initialize the white list database and to complete the measurement benchmark setting. The verification module is triggered before the application program is executed, and the short code of the program is detected first, and then the long code verification of the hash value of the program is determined according to the detection result. Using the long and short code of the application to measure and verify the application can improve the efficiency of application measurement and verification; combining the monitoring module to monitor the program in real time, and designing the conversion rules between the various categories of application tags in different scenarios to ensure rapid obtain the complete status of the program in a precise manner,the entire program realizes real-time and efficient control of the application.
Key words : integrity verification;integrity measurement;LSM;executive control Network and Information Security
0 引言
隨著計(jì)算機(jī)的普及,人們每天都通過計(jì)算機(jī)和互聯(lián)網(wǎng)獲取信息、進(jìn)行各種活動(dòng),信息技術(shù)已經(jīng)成為人們生活中不可分割的一部分。但計(jì)算機(jī)與網(wǎng)絡(luò)空間并不總是安全的,在給人們帶來(lái)便利的同時(shí)也會(huì)帶來(lái)巨大的安全威脅。病毒、木馬等非法或惡意代碼是通過篡改或替換系統(tǒng)應(yīng)用程序而達(dá)到對(duì)系統(tǒng)進(jìn)行攻擊,進(jìn)而試圖進(jìn)入系統(tǒng)以獲取其非法目的。傳統(tǒng)常規(guī)的安全防護(hù)手段已無(wú)法實(shí)時(shí)保障計(jì)算機(jī)的安全可靠,需要一種可靠、高效和實(shí)時(shí)的完整性度量校驗(yàn)機(jī)制來(lái)解決存在的問題。
本文詳細(xì)內(nèi)容請(qǐng)下載:http://ihrv.cn/resource/share/2000003470
作者信息:
姬一文,楊 釗,王玉成,楊詔鈞,康 昱
(麒麟軟件有限公司,湖南 長(zhǎng)沙410000)
此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。
