【24h】

Correlation-Based Traffic Analysis on Encrypted VoIP Traffic

机译:基于相关性的加密VoIP流量分析

获取原文
获取原文并翻译 | 示例

摘要

Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom up. There is an urgent need to test the chain of trust according to the specification of TC to ensure its security. This paper presents a test method on chain of trust by model checking. The purpose is to confirm that the measurements stored and reported by the platform configuration register can successfully discriminate a normal boot sequence from an insecure one. As a result, our test shows that the chain of trust on some popular trusted computing platforms donȁ9;t meet the specifications of Trusted Computing Group.
机译:可信计算和信任链是解决信息系统安全问题的机制。通过自下而上地验证硬件和软件的每个组件来建立信任链。迫切需要根据TC的规范测试信任链,以确保其安全性。本文提出了一种基于模型检查的信任链测试方法。目的是确认平台配置寄存器存储和报告的测量值可以成功地将正常启动顺序与不安全的启动顺序区分开。结果,我们的测试表明,某些流行的可信计算平台上的信任链不符合Trusted Computing Group的规范。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号