首页> 外文期刊>Journal of supercomputing >Efficient scheme of verifying integrity of application binaries in embedded operating systems
【24h】

Efficient scheme of verifying integrity of application binaries in embedded operating systems

机译:验证嵌入式操作系统中应用程序二进制文件完整性的有效方案

获取原文
获取原文并翻译 | 示例

摘要

Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this research, the basic approach to solving problems from the software perspective was employed. From the software perspective, unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004; Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary to the previous schemes (Jung et al. http://ettrends.etri.re.kr/PDFData/23-1_001_011.pdf, 2008; Lee et al., LNCS, vol. 4808, pp. 346-355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous schemes.
机译:当前,嵌入式系统已被广泛用于无处不在的计算环境,包括数字设置盒,移动电话和USN(无处不在的传感器网络)。安全性的重要性一直在增长,因为必须将其必须嵌入所有这些系统中。到目前为止,许多研究人员已努力验证嵌入式系统中下载的应用程序二进制文件的完整性。解决问题的研究分为硬件方法和软件方法。在这项研究中,采用了从软件角度解决问题的基本方法。从软件的角度来看,与公开的标准化模型为基础的现有论文(Seshadri等人,Proc。IEEE安全和隐私研讨会,2004; Seshadri等人,Proc。操作系统原理研讨会,2005)不同。在韩国,目标系统中没有额外的验证程序和验证功能。与先前的方案相反(Jung等人,http://ettrends.etri.re.kr/PDFData/23-1_001_011.pdf,2008; Lee等人,LNCS,第4808卷,第346-355页,2007年) ),验证结果存储在1个验证检查位中,而不是在i节点结构中存储应用程序二进制文件的签名值,以减少运行时执行开销。因此,提出的方案效率更高,因为它大大减少了存储空间的开销,并且在计算时,它会执行一个哈希算法进行初始执行,然后仅比较1个验证检查位,而不是针对每个应用程序比较签名和哈希算法二进制此外,在根据方案应用而在i节点结构或文件数据频繁变化的情况下,与先前方案相比,该方案可以提供更为有效的验证性能。

著录项

  • 来源
    《Journal of supercomputing》 |2012年第2期|p.676-692|共17页
  • 作者单位

    Department of Computer Engineering, Halla University, San 66, Heungup-Li, Heungup-myon, Wonju-shi, Kangwon-do, Republic of Korea;

    ETRI (Electronics & Telecommunications Research Institute) 161, Gajeong-dong, Yuseong-gu, Daejeon, Republic of Korea;

    Department of Computer Science and Engineering, Seoul National University of Technology, 172 Gongreung 2-dong, Nowon-gu, Seoul, Republic of Korea;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    embedded operating system; operating system; ubiquitous computing; integrity; application binaries;

    机译:嵌入式操作系统;操作系统;普适计算;诚信应用程序二进制文件;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号