Unlock instant, AI-driven research and patent intelligence for your innovation.

Test method for trusted software stack based on fuzzy technology

A testing method and fuzzing testing technology, applied in the field of information system security to achieve the effect of intercepting and replacing functions

Inactive Publication Date: 2013-03-13
WUHAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, there is currently a lack of assessment of the vulnerability, security threats and impact of the trusted software stack software itself, and lack of inspection of whether there are security defects in it. Therefore, the trusted software stack needs to propose an effective method for security defect testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test method for trusted software stack based on fuzzy technology
  • Test method for trusted software stack based on fuzzy technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Below in conjunction with accompanying drawing, the present invention will be further described with specific embodiment:

[0029] The test model of trusted software stack is as follows figure 1 As shown, before performing security testing on the trusted software stack TSS, it is first necessary to analyze the design specification on which the trusted software stack TSS design is based, and extract specific test requirements. For the service provider and core service layer functions in TSS, use the corresponding test modules to automatically generate test cases and test automatically through the specification analysis checker. After adding the fuzzing strategy to the automatic generation of test cases, it can interact with the trusted software station TSS products for input and output. Finally, output the test results, use the evaluation method to summarize and evaluate the test results, and give quantitative test reports and opinions.

[0030] figure 1 Shown is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the safe technical field of a communication system, in particular to a test system for a trusted software stack based on a fuzzy technology. The test system comprises a service supporter test module and a core service test module, wherein, the service supporter test module further comprises a user function communication intercept submodule and a fault injection submodule; and the core service test model further comprises a network communication intercept submodule and a fault injection submodule. In the test content, the system can achieve effective intercept for data communication at various levels of the trusted software stack, and can achieve the intercept and replacement function of a data packet under the condition that a flow which can be normally implemented is not affected; in a test method, the system configures test data through using the fuzzy technology; and the method comprises analyzing and recognizing data according to a communication data format, configuring test data variables according to a fuzzy test algorithm with safety defect and repackaging data according to the communication data format.

Description

technical field [0001] The invention relates to the technical field of information system security, in particular to a method for testing trusted software stacks based on fuzzy technology. Background technique [0002] As a new technology of information system security, trusted computing has become one of the research hotspots in the field of information science and technology. Internationally, the Trusted Computing Group (Trusted Computing Group, see Document 1) has formulated and continuously improved a series of technical specifications, and Trusted Computing products are increasingly industrialized and serialized. So far, almost all mainstream notebook manufacturers have adopted Or plan to configure TPM security chip in the product, trusted PDA, trusted server and other products have also been launched. [0003] The main point of so-called trusted computing is to introduce a security chip architecture on the PC hardware platform, and improve terminal security by providi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36G06F21/57
Inventor 严飞张焕国傅建明杨飏何凡张娅珊吴俊周鹏
Owner WUHAN UNIV