Research on theory and key technology of trusted computing platform security testing and evaluation

被引:0
作者
HuanGuo Zhang
Fei Yan
JianMing Fu
MingDi Xu
Yang Yang
Fan He
Jing Zhan
机构
[1] Wuhan University,School of Computer
[2] Ministry of Education,Key Laboratory of Aerospace Information Security and Trusted Computing
来源
Science China Information Sciences | 2010年 / 53卷
关键词
information security; trusted computing; trusted computing platform; testing and evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
Trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of information security, unless it goes through the testing and evaluation. Here we concentrate on the testing and evaluation problem of trusted computing platform, begin with constructing proper formalization model of trusted computing platform for testing, and establish a mathematical chain of trust model based on SPA. Moreover, we give a verification method of composite characteristics and find the potential factors threatening the trusted system in the process of remote attestation through analysis. For trusted software stack, we study the problem of automatic generation of test case and propose an improved method of generating the random test case, to raise the quality of test case. Finally, we give a prototype system of trusted computing platform and the actual test data related. The result demonstrates that there exist some flaws in the architecture of the present TCG computing platform. At the same time, some flaws are found in the products of existing trusted computing platform, thus a basis is laid for the improvement and development of trusted platform technology and its products.
引用
收藏
页码:434 / 453
页数:19
相关论文
共 28 条
[1]  
Shen C.(2007)Survey of information Security Sci China Ser F-Inf Sci 50 273-298
[2]  
Zhang H.(2006)Development of trusted computing research J Wuhan Univ (Nat Sci Ed) 52 513-518
[3]  
Feng D.(2007)Ten years’ exploration for test, evaluation and certification of information security Inf Secur Comm Priv 6 5-8
[4]  
Zhang H.(2009)Automated testing of the trusted platform module J Comp Res Develop 48 1839-1846
[5]  
Luo J.(2009)Research on compliant testing method of trusted cryptography module J Comput 32 654-663
[6]  
Jin G.(2008)An approach for compliance validation of TPM through applications J Graduate School Chinese Acad Sci. 25 649-656
[7]  
Wu S.(2009)Testing on trust chain of trusted computing platform based on labeled transition system J Comput 32 635-645
[8]  
Zhan J.(2008)Research on cryptology mechanism of trusted computing platform module J Comput Appl 28 1907-1915
[9]  
Zhang H.(2009)The formal analysis and testing of trusted platform module J Comput 32 646-653
[10]  
Li H.(2009)Compliant testing method of trusted cryptography module J Wuhan Univ (Nat Sci Ed) 55 31-34