科技报告详细信息
Principles of Faithful Execution in the implementation of trusted objects.
Tarman, Thomas David ; Campbell, Philip LaRoche ; Pierson, Lyndon George
Sandia National Laboratories
关键词: Modifications Computer Software-Development.;    99 General And Miscellaneous//Mathematics, Computing, And Information Science;    Computers;    Computer Software-Development.;    Computer Security.;   
DOI  :  10.2172/917142
RP-ID  :  SAND2003-2328
RP-ID  :  AC04-94AL85000
RP-ID  :  917142
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

We begin with the following definitions: Definition: A trusted volume is the computing machinery (including communication lines) within which data is assumed to be physically protected from an adversary. A trusted volume provides both integrity and privacy. Definition: Program integrity consists of the protection necessary to enable the detection of changes in the bits comprising a program as specified by the developer, for the entire time that the program is outside a trusted volume. For ease of discussion we consider program integrity to be the aggregation of two elements: instruction integrity (detection of changes in the bits within an instruction or block of instructions), and sequence integrity (detection of changes in the locations of instructions within a program). Definition: Faithful Execution (FE) is a type of software protection that begins when the software leaves the control of the developer and ends within the trusted volume of a target processor. That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.) FE is a necessary quality for computing. Without it we cannot trust computations. In the early days of computing FE came for free since the software never left a trusted volume. At that time the execution environment was the same as the development environment. In some circles that environment was referred to as a ''closed shop:'' all of the software that was used there was developed there. When an organization bought a large computer from a vendor the organization would run its own operating system on that computer, use only its own editors, only its own compilers, only its own debuggers, and so on. However, with the continuing maturity of computing technology, FE becomes increasingly difficult to achieve

【 预 览 】
附件列表
Files Size Format View
917142.pdf 215KB PDF download
  文献评价指标  
  下载次数:26次 浏览次数:8次