Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for remotely proving control flow integrity of hardware-assisted software

A remote certification and software control technology, applied in the fields of platform integrity maintenance, instrumentation, electrical digital data processing, etc., can solve problems such as difficulty in analyzing control flow graphs, hard to find, and reduced user acceptability

Active Publication Date: 2018-07-31
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This results in a costly implementation of remote attestations of integrity, which leads to reduced user acceptability
Then there is the issue of accuracy
The software control flow graph is a very complex graph, and it is difficult to use a metric value to represent whether it is complete or not
In fact, the loops, jumps and other structures in the control flow graph make it very difficult to analyze the control flow graph
As far as the loop structure is concerned, as the external environment and software input change, the number of times the software cycles on a certain structure may also change, and it is difficult to find a fixed relationship between the number of cycles and the correctness of software operation
C-FLAT also spends a lot of effort to deal with these special structures in the control flow graph, but when it is applied to non-embedded devices with more complex external environments, these methods are not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for remotely proving control flow integrity of hardware-assisted software
  • Method for remotely proving control flow integrity of hardware-assisted software
  • Method for remotely proving control flow integrity of hardware-assisted software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] For ease of understanding, the following explanations are made to some nouns appearing in the present invention:

[0055] 1. Remote proof: In order to make remote entity A believe a certain statement of entity B, entity B provides relevant evidence to remote entity A to support its own statement. A typical application scenario of remote attestation is as follows. The user hopes to visit the bank website through the network, and claims that he has installed the latest antivirus software, and his access behavior will not endanger the security of the bank website. In order to verify that the host used by the user meets the security requirements for connecting to the bank website, the bank website randomly sends the user a sample containing the latest virus, and determines whether the user has installed the latest antivirus software based on the results of the user's killing.

[0056] 2. Verifier and prover: In remote proof, user A provides some kind of evidence to user B ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of remote control flow integrity proof methods, and particularly relates to a method for remotely proving control flow integrity of hardware-assisted software. The method comprises the following steps of: when a program is loaded into an internal memory to be operated in an operation system in a process form, executing all the instructions of the program by a processor; recording a control transfer instruction executed by the processor by a BTS hardware characteristic of the processor and recording control transfer information to an appointed position in the internal memory; in order to check whether a BTS record is integral or not by a verification party, extending an integrity fingerprint of the BTS record into a PCR of a TPM; after the verification party put forwards a verification request, submitting the BTS record and the record fingerprint to the verification party by a proof party; and verifying the integrity of the BTS record by theverification party according to the record fingerprint, and verifying control flow integrity of software according to the BTS record and a reference value. According to the method, the efficiency of capturing the control transfer information is improved, the correctness of judging the control flow integrity is improved, and remote proof services can be provided.

Description

technical field [0001] The invention belongs to the technical field of remote certification methods for control flow integrity, in particular to a hardware-assisted remote certification method for software control flow integrity. Background technique [0002] If a user needs to submit data to a remote server for processing, the user naturally wants to know that the remote server can use the data legally as it claims, rather than using the data illegally. In order to eliminate users' worries, service providers need to provide such a mechanism that can prove that their software legally uses customer data. This is a typical application background for remote attestation. [0003] In the field of remote attestation, there are many forms of evidence provided by the prover to the verifier. Software control flow integrity is a very important type of evidence. Software control flow is an abstract representation of all possible instruction execution sequences during program executi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/54G06F21/57
CPCG06F21/54G06F21/577G06F2221/033
Inventor 周洪伟原锦辉张来顺冀会芳关慧
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products