首页 | 官方网站   微博 | 高级检索  
     

显式授权机制及对应的可信安全计算机
引用本文:何鸿君,曹四化,罗莉,冯涛,潘莉,邹之霁. 显式授权机制及对应的可信安全计算机[J]. 计算机学报, 2006, 29(8): 1318-1328
作者姓名:何鸿君  曹四化  罗莉  冯涛  潘莉  邹之霁
作者单位:国防科学技术大学计算机学院,长沙,410073
摘    要:现代计算机系统对恶意程序窃取、破坏信息无能为力的根本原因在于系统强行代替用户行使对信息的支配权,却又不能忠实履行用户的意愿.对此提出显式授权机制,给出了信息窃取、破坏型恶意程序的精确定义,并证明基于显式授权机制的计算机能够实时、可靠抵御恶意程序的窃取、破坏攻击;给出了基于该机制的两种可信安全计算机系统.第一种可信安全计算机系统是直接将显式授权机制融入到操作系统中,能够实时、可靠抵御任意恶意程序和隐藏恶意的应用程序的信息攻击,同时与现有计算机系统具有很好的软硬件兼容性.第二种可信安全计算机系统对现有计算机硬件结构、操作系统均有小改动,但具有更强的抗攻击性能,能够实时、可靠阻止恶意操作系统自身发起的破坏攻击.

关 键 词:信息窃取  信息破坏  恶意程序  显式授权机制  可信安全计算机
收稿时间:2005-11-30
修稿时间:2005-11-302006-06-02

Explicit Authorization Mechanism and Corresponding Trusted Secure Computer Systems
HE Hong-Jun,CAO Si-Hua,LUO Li,FENG Tao,PAN Li,ZOU Zhi-Ji. Explicit Authorization Mechanism and Corresponding Trusted Secure Computer Systems[J]. Chinese Journal of Computers, 2006, 29(8): 1318-1328
Authors:HE Hong-Jun  CAO Si-Hua  LUO Li  FENG Tao  PAN Li  ZOU Zhi-Ji
Affiliation:School of Computer Science, National University of Defense Technology, Changsha 410073
Abstract:In this paper, the authors point out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information. Based on it, the authors propose an explicit authorization mechanism, and give a formal definition of malware that steals or destroys information. Further, they prove that computer based on this novel mechanism can protect information from attacking reliably, and present two trusted secure computer systems based on it. In the first system, the explicit authorization mechanism is embedded into operating system, and the system can prevent information from being attacked by arbitrary malware or malicious application. The system is highly compatible with current computer hardware and software. In the second system, slight changes are made to hardware and operating system. However, the system has stronger anti-attack ability and can prevent attack from operating system itself reliably and timely.
Keywords:information stealing   information destroying   malware   explicit authorization mechanism   trusted secure computer system
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号