首页> 外文学位 >System design and verification methodologies for secure computing.
【24h】

System design and verification methodologies for secure computing.

机译:用于安全计算的系统设计和验证方法。

获取原文
获取原文并翻译 | 示例

摘要

The security of computing systems can be threatened through compromise of system confidentiality, integrity, and availability. As the complexity, programmability, and network connectivity of computing systems increase, ensuring the security of these systems becomes more challenging.;This thesis describes system design and verification methodologies for secure computing systems. These methodologies are built on the observation that despite the huge complexity of computing systems—hardware, firmware, and various layers of software, many security-critical functions may depend on only a small subset of these components with careful system design. The security goals of confidentiality, integrity, and availability can be achieved by only protecting this subset.;The thesis explores several computing system designs, in which security-critical functions are identified and analyzed for different threat models, and then isolated in a separate and trusted execution environment. For security-critical software running on embedded computing systems that interact with the physical world, such as medical devices, this thesis also introduces a novel approach of software verification at real-world interfaces. The thesis first discusses the security of software-defined radio and proposes an architecture based on robust separation of the radio operation environment from the user application environment, so that the security-critical functions for radio operation can be protected inside the radio operation environment. The thesis next discusses the security of virtual machine execution, and proposes an architecture that significantly reduces the size of the software components set that virtual machine execution depends on. The thesis also investigates the security of input/output interfaces for web applications, and separates them from a potentially compromised operating system or application.;The thesis also explores attacks against and defenses for medical devices, and proposes methodologies to improve the trustworthiness of their security-critical software components with formal verification methods.
机译:损害系统机密性,完整性和可用性可能会威胁计算系统的安全性。随着计算系统的复杂性,可编程性和网络连通性的增加,确保这些系统的安全性变得越来越具有挑战性。;本文介绍了安全计算系统的系统设计和验证方法。这些方法基于以下观察结果:尽管计算系统非常复杂,包括硬件,固件和软件的各个层,但是许多安全关键功能可能仅依赖这些组件中的一小部分进行仔细的系统设计。仅保护该子集即可实现机密性,完整性和可用性的安全性目标。本文探讨了几种计算系统设计,其中针对不同的威胁模型识别并分析了安全关键功能,然后将其隔离在一个单独的受信任的执行环境。对于在与物理世界交互的嵌入式计算系统(例如医疗设备)上运行的安全性至关重要的软件,本文还介绍了一种在现实世界接口上进行软件验证的新颖方法。本文首先讨论了软件无线电的安全性,并提出了一种基于将无线电操作环境与用户应用程序环境稳健分离的架构,从而可以在无线电操作环境内保护对无线电操作至关重要的安全功能。接下来,本文讨论了虚拟机执行的安全性,并提出了一种可显着减少虚拟机执行所依赖的软件组件集大小的体系结构。本文还研究了Web应用程序的输入/输出接口的安全性,并将它们与可能受到威胁的操作系统或应用程序分离。;本文还探讨了针对医疗设备的攻击和防御,并提出了提高其安全性的方法论。 -具有正式验证方法的关键软件组件。

著录项

  • 作者

    Li, Chunxiao.;

  • 作者单位

    Princeton University.;

  • 授予单位 Princeton University.;
  • 学科 Engineering Computer.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 191 p.
  • 总页数 191
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号