基于長短碼聯(lián)合控制的程序完整性校驗方法
信息技術(shù)與網(wǎng)絡安全
姬一文,,楊 釗,,王玉成,,楊詔鈞,,康 昱
(麒麟軟件有限公司,,湖南 長沙410000)
摘要: 提出了一種基于長短碼聯(lián)合度量的程序完整性校驗方法,。分析了操作系統(tǒng)文件系統(tǒng)的特點,,基于LSM框架設計文件監(jiān)控模塊,,實現(xiàn)對文件完整性實時標記,,可主動標記識別被篡改文件;應用程序安裝到操作系統(tǒng)時,,會對該程序計算哈希值和設定短碼標記,,來初始化白名單數(shù)據(jù)庫完成度量基準的設定;應用程序執(zhí)行前觸發(fā)校驗模塊,,先檢測程序的短碼標記,,根據(jù)檢測結(jié)果再決定對程序的哈希值長碼校驗。使用應用程序長短碼聯(lián)合度量校驗,,提高應用程序度量校驗效率,;結(jié)合監(jiān)控模塊對程序的實時監(jiān)控,并針對不同場景,,設計了應用程序的標記在多種類別之間的轉(zhuǎn)換規(guī)則,,保證快速精細地獲取程序完整的狀況。整套方案實現(xiàn)了對應用程序?qū)崟r高效的控制,。
中圖分類號: TP309
文獻標識碼: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,,楊釗,王玉成,,等. 基于長短碼聯(lián)合控制的程序完整性校驗方法[J].信息技術(shù)與網(wǎng)絡安全,,2021,,40(4):1-6.
文獻標識碼: A
DOI: 10.19358/j.issn.2096-5133.2021.04.001
引用格式: 姬一文,,楊釗,王玉成,,等. 基于長短碼聯(lián)合控制的程序完整性校驗方法[J].信息技術(shù)與網(wǎng)絡安全,,2021,,40(4):1-6.
Program integrity verification method based on combined control of long and short codes
Ji Yiwen,Yang Zhao,,Wang Yucheng,,Yang Zhaojun,Kang Yu
(Kylin Software Co.,,Ltd.,Changsha 410000,,China)
Abstract: This paper proposes a program integrity verification method based on the combined measurement of long and short codes. It analyzes the characteristics of the operating system file system, designs a file monitoring module based on the LSM framework, realizes real-time marking of file integrity, and can actively mark and identify tampered files. When the application program is installed in the operating system, the program will calculate the hash value and set the short code mark to initialize the white list database and to complete the measurement benchmark setting. The verification module is triggered before the application program is executed, and the short code of the program is detected first, and then the long code verification of the hash value of the program is determined according to the detection result. Using the long and short code of the application to measure and verify the application can improve the efficiency of application measurement and verification; combining the monitoring module to monitor the program in real time, and designing the conversion rules between the various categories of application tags in different scenarios to ensure rapid obtain the complete status of the program in a precise manner,,the entire program realizes real-time and efficient control of the application.
Key words : integrity verification;integrity measurement,;LSM,;executive control Network and Information Security
0 引言
隨著計算機的普及,人們每天都通過計算機和互聯(lián)網(wǎng)獲取信息,、進行各種活動,,信息技術(shù)已經(jīng)成為人們生活中不可分割的一部分。但計算機與網(wǎng)絡空間并不總是安全的,,在給人們帶來便利的同時也會帶來巨大的安全威脅,。病毒、木馬等非法或惡意代碼是通過篡改或替換系統(tǒng)應用程序而達到對系統(tǒng)進行攻擊,,進而試圖進入系統(tǒng)以獲取其非法目的,。傳統(tǒng)常規(guī)的安全防護手段已無法實時保障計算機的安全可靠,需要一種可靠,、高效和實時的完整性度量校驗機制來解決存在的問題,。
本文詳細內(nèi)容請下載:http://forexkbc.com/resource/share/2000003470
作者信息:
姬一文,楊 釗,,王玉成,,楊詔鈞,康 昱
(麒麟軟件有限公司,,湖南 長沙410000)
此內(nèi)容為AET網(wǎng)站原創(chuàng),,未經(jīng)授權(quán)禁止轉(zhuǎn)載。