首页> 外文会议> >Spy: a method to secure clients for network services
【24h】

Spy: a method to secure clients for network services

机译:间谍:一种保护客户端网络服务的方法

获取原文

摘要

A fundamental problem in security is guaranteeing correct program behavior on an untrusted computer regardless of a user's actions. The problem appears in digital rights management, secure boot, e-appliances, etc. All existing approaches are either partial or unreliable. Today, dependable security is necessary not only for e-commerce, but also to ensure that, under critical conditions of information warfare, remote clients behave predictably and securely, and cannot compromise the infrastructure. We prove that the problem of correct program execution is unsolvable without adoption of a trusted hardware platform. Since it is impractical to consider as trusted a complex computer system, we identify the minimal hardware support that enables a complete solution. We propose two simple hardware mechanisms which require minimal change to the currently popular PC architecture: (i) the use of a trusted "sealed" computing device, the "spy", and (ii) a hardware interrupt, called "two minute warning", which has the highest priority and has a pre-defined time difference from any subsequent interrupt. Finally, we incrementally build upon this minimal hardware support larger and more complex applications with guaranteed security. We call this construction the inverse security pyramid.
机译:安全性中的一个基本问题是,无论用户的行为如何,都必须保证不受信任的计算机上的程序行为正确。该问题出现在数字版权管理,安全启动,电子设备等中。所有现有方法都是不完全的或不可靠的。如今,可靠的安全性不仅对于电子商务是必要的,而且对于确保在信息战的关键条件下远程客户端的行为具有可预测性和安全性,并且不会损害基础结构,这是必不可少的。我们证明,如果不采用可信的硬件平台,就无法解决程序正确执行的问题。由于将复杂的计算机系统视为可信的系统是不切实际的,因此,我们确定了实现完整解决方案所需的最小硬件支持。我们提出了两种简单的硬件机制,它们需要对当前流行的PC体系结构进行最小的更改:(i)使用受信任的“密封”计算设备“间谍”,以及(ii)称为“两分钟警告”的硬件中断。 ,它具有最高优先级,并且与任何后续中断都具有预定义的时间差。最后,我们以最小的硬件支持为基础,逐步增加了对更大,更复杂的应用程序的支持,并确保了安全性。我们称这种构造为逆安全金字塔。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号