信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 49-55.doi: 10.3969/j.issn.1671-1122.2017.06.008

• Contents • Previous Articles     Next Articles

Design and Implementation of Anti APT Attack Trusted Software Base

ZHANG Jiawei, ZHANG Dongmei, HUANG Siqi   

  1. School of Cyber Space Security,Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Received:2017-04-15 Online:2017-06-20

Abstract: Traditional TCG trusted computing technology aims to improve the computing platform's own safety and immunity. The main module of TCG is mounted on the external bus of general-purpose computing platform, using passive defense on application software, static files and others, programs that only comply with the TCG trusted service interface specification can be monitored, which makes it lack of supervision, especially weak on defensing APT and 0day attack, weakened the overall security of the platform. In this paper, we put forward an Anti APT Attack Trusted Software Base using white list of strong access control technology. With the trust chain expansion capability, TSB can extend trust chain from TCM chip to make sure the operation of operating system and business software safe and reliable. Experimental results shows that the Anti APT Attack Trusted Software Base can dynamically and actively measure the business processing system, and it is suitable for constructing autonomous controllable Linux trusted computing platform.

Key words: APT attack defense, trusted software base, Linux security model, trusted computing

CLC Number: