Abstract
Trustworthiness measurement is the base and important supporting technology of Trusted Computing. The main objective of trustworthiness measurement is that, how to estimate the trustworthiness of different objects by appropriate policies. In measurement, accessing the address space of measured objects and obtaining the various datum and evidences are considered firstly. Aiming to this problem, this paper presents the primary measurement system architecture, and puts forward three methods of MA(Measurement Agent)in user space invoking MMK(Measurement Module in Kernel)in kernel space. In addition, the principal and realization of accessing a process address space is proposed, including address remapping, switching the CR3 manually and by kernel thread. Finally, three methods are compared qualitatively, and performance consumption is listed by experiment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
Shen, C.X., Zhang, H.G., Feng, D.G., et al.: Research and development of trusted computing. China Science 40(2), 139–166 (2010) (in Chinese)
Liu, Z.W., Feng, D.G.: TPM-Based Dynamic Integrity Measurement Architecture. Journal of Electronics & Information Technology 32(4), 875–879 (2010) (in Chinese)
Li, X.Y., Gui, X.L., Mao, Q., et al.: Adaptive Dynamic Measurement and Prediction Model Based on Behavior Monitoring. Chinese Journal of Computer 32(4), 664–674 (2009) (in Chinese)
Cai, S.B., Zou, Y.Z., Shao, L.S., et al.: Framework Supporting Software Assets Evaluation on Trustworthiness. Journal of Software 21(2), 359–372 (2010) (in Chinese)
Sailer, R., Zhang, X., Jaeger, T., et al.: Design and implementation of a TCG-based integrity measurement architecture. In: 3th Conference on USENIX Security Symposium, pp. 223–238. USENIX Association, Berkeley (2004)
Trusted Computing Group. TCG Specification Architecture Overview [DB/OL] (March 01, 2005), https://www.trustedcomputinggroup.org/
Lin, H., Lee, G.: Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. Journal of Information Security 1, 1–10 (2010)
Maruyama, H., Nakamura, T., Munetoh, S., et al.: Linux with TCPA Integrity Measurement. IBM Japan, Ltd. (January 28, 2003)
Jaeger, T., Sailer, T., Shankar, U.: PRIMA: Policy-reduced integrity measurement architecture. In: The 11th ACM Symposium on Access Control Models and Technologies, pp. 19–28. ACM, New York (2006)
Azab, A.M., Ning, P., Sezer, E.C., et al.: HIMA: A Hypervisor-Based Integrity Measurement Agent. In: The 2009 Annual Computer Security Application Conference, pp. 461–470. IEEE, Honolulu (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, C., Cui, G., Jin, B., Wang, L. (2012). Study of Trustworthiness Measurement and Kernel Modules Accessing Address Space of Any Process. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-34062-8_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34061-1
Online ISBN: 978-3-642-34062-8
eBook Packages: Computer ScienceComputer Science (R0)