Method and system for protecting data structure in Linux kernel initialization based on TPM (Trusted Platform Module)

A data structure and initialization technology, applied in the direction of digital data protection, platform integrity maintenance, etc., can solve problems such as large amount of tool code, malicious code injection or dynamic modification of data structure that cannot be found in time, and unfavorable replay attacks.

Active Publication Date: 2013-04-03
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of these detection tools are poor real-time performance and the large amount of code in the tool itself. Malicious code injection or dynamic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting data structure in Linux kernel initialization based on TPM (Trusted Platform Module)
  • Method and system for protecting data structure in Linux kernel initialization based on TPM (Trusted Platform Module)

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0080] Taking GRUB-0.9.7 as the boot loader and the initialization of the Linux-2.6.32 kernel as an example, the data structure protection method in the TPM-based Linux kernel initialization of the present invention is further described.

[0081] figure 1 It is a flow chart of the data structure protection method in the TPM-based Linux kernel initialization of the present invention. Such as figure 1 As shown, the method includes:

[0082] Step 1. Calculate the integrity metric of the Linux kernel after booting the loader and record it as Kernel-Integrity-Value1;

[0083] Step 2: Digitally sign the Kernel-Integrity-Value1 and initialize the data structure as Loader_Secure_Data;

[0084] Step 3. Send the Loader_Secure_Data to the Linux kernel;

[0085] Step 4. Verify the integrity of the Linux kernel and decompress the Linux kernel;

[0086] Step 5: Perform TPM-based data binding operations on initializing page tables, initializing GDT tables, and initializing IDT tables respectively;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for protecting a data structure in Linux kernel initialization based on a TPM (Trusted Platform Module). A mirror image main body of a Linux kernel, and a kernel page table, a GDT (Globe Descriptor Table) and an IDT (Interrupt Descriptor Table) (containing a system calling table) which are loaded during the process of the Linux kernel initialization are subjected to protecting operations based on the TPM, such as trusted verification, trusted data binding, trusted digital signature, and the like, so that the common opportunities of loading the Linux kernel during the initialization process by RootKit are avoided, the method is very suitable for the trusted initialization of the Linux kernel and the trusted initialization of a virtual machine under a present cloud computing environment, the method has an important practical significance in constructing a trusted cloud platform, and the market prospect and the application value are excellent.

Description

technical field [0001] The invention relates to a trusted operating system kernel, in particular to a data structure protection method and system in TPM-based Linux kernel initialization. Background technique [0002] In the cloud computing mode, the Linux operating system provides users with a large number of services on the customer service side in the form of images, but at the same time, the key data structures of the Linux kernel itself are attacked by malicious RootKits more than ever before, and these RootKit It is concealed, persistent, and simple, so it will be more difficult to check and completely remove these RootKits. [0003] In order for the Linux operating system to work normally, the Linux kernel must track thousands of objects. These objects themselves are intricately intertwined with data structures such as queues, linked lists, and trees. There are a large number of tables that store some fixed attributes of these objects. Therefore, for RootKit attacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/64
Inventor 薛栋梁高云伟杨鹏斐展旭升孙毓忠
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products