Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. ...
Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.
Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
제안 방법
Accordingly, this study intends to combine a computer system that operates based on TPM-mounted TPB with m-TMS that monitors the current status of the system’s resources and its reliability.
In order to provide a higher-level of reliability than existing software security methods, the m-TMS embodied in this study provides real-time monitoring of the information and resources of a computer system on which TPM chip-based TPB is mounted and visualizes the information and trusted state of the computer system regarding multiple IPs and not for a single IP. m-TMS provides monitoring to users by visualizing the current status of resources and the trusted state of IaaS in a cloud computing system.
This service is provided through the web and therefore in case the reliability of security in computer storage devices and computer capabilities is lowered, all of its user’s information may be exposed. In this study, the user monitors on a real time basis the trusted state of IaaS, which uses a TPB-mounted computer system through m-TMS, and therefore may deal with malicious behaviors, thereby increasing system stability[7-8].
Accordingly, this paper proposes easy, fast, and intuitional monitoring functions for the notification of abnormal conditions and trust evaluation. This study develops m-TMS, which evaluates and monitors system conditions in a mobile-device environment, and it may operate in any environment where network services are provided in order to provide high reliability on a client level. Mobile device-based m-TMS monitoring supports the following technologies in a cloud environment regarding the trusted state of a TPM-chip mounted TPB (Trusted Platform Board).
후속연구
Accordingly, this paper proposes easy, fast, and intuitional monitoring functions for the notification of abnormal conditions and trust evaluation. This study develops m-TMS, which evaluates and monitors system conditions in a mobile-device environment, and it may operate in any environment where network services are provided in order to provide high reliability on a client level.
Future research will concern m-TMS’s functions and not just its monitoring functions for responding to attacks and its logging functions for notifying users of possible locations of logical errors caused by attacks, the possibility of attack on each process, and the occurrence of problems with a trusted state.
Common Criteria, Trusted Computing Group Personal Computer Specific Trusted Building Block Protection Profile and TCG PC Specific TBB With Maintenance Protection Profile, 2004.
H. Lin and G. Lee, "Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace," Journal of Information Security, Vol.1, No.1, 2010, pp.1-10.
Y. S. Jeong and J. H. Park, "Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing," Journal of Internet Technology, Vol 11., No.6, 2010, pp.731-741.
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Science and Technology, 2011. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
V. William, B. James, B. Rajkumar "Introduction to Cloud Computing," In R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press, 2011, pp.1-44.
G. Suh, C. O'Donnell, I. Sachdev and S. Devadas, "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions. Technical Report," 2004, MIT CSAIL CSG Technical Memo 483.
T. Alves and D. Felton, "Trustzone: Integrated Hardware and Software Security", 2004. ARM white paper.
J. Crandall and F. Chong, "Minos: Control Data Attack Prevention Orthogonal To Memory Model", Proc. the 37th Int'l Symp., On Microarchitecture, 2004.
Renato J. Figueiredo, Peter A. Dinda and Jose A. B. Fortes, Guest Editors' Introduction: Resource Virtualization Renaissance, IEEE Computer, Vol.38, No.5, 2005, pp.28-31.
Common Criteria, Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB With Maintenance Protection Profile, July, 2004.
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Alex Ho, Rolf Neugebauer, Ian Pratt and Andrew Warfield, Xen and the Art of Virtualization, Proceedings of the ACM Symposium on Operating Systems Principles, Bolton Landing, NY, October, 2003.
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum and Dan Boneh, Terra: A Virtual Machine-Based Platform for Trusted Computing, Proceedings of the Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October, 2003, pp.193-206.
Robert P. Goldberg, Survey of Virtual Machine Research, IEEE Computer Magazine, Vol.7, No.6, 1974, pp.34-45.
IBM, Trusted Virtual Data Center, http://domino.research.ibm.com/comm/researchprojects.nsf/pagesssdtrustedvirtualdatacenter.index.html.
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin and Leendert van Doorn, Building a MAC-Based Security Architecture for the Xen Opensource Hypervisor, Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December, 2005.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.