信息网络安全 ›› 2014, Vol. 14 ›› Issue (10): 1-6.doi: 10.3969/j.issn.1671-1122.2014.10.001

• Orignal Article •     Next Articles

A Model of Source Code Security Investigation Based on Trusted Computing Technology

ZHANG Yi1, 2, WANG Wei1, 2, WANG Liu-cheng1, 2, HAO Mei-ci3   

  1. 1. Department of Computer Science and Engineering, Tongji University, Shanghai 200092, China;
    2 . Tongji Branch National Engineering & Technology Center of High Performance, Shanghai 200092, China;
    3 . China Standard Software Co., Ltd., Shanghai 200030, China
  • Received:2014-07-21 Online:2014-10-01

Abstract: In the stage of large-scale software engineering development, the scale of source code has become increased. With the surge in the number of the source code, the code is more complex logic, calling more complicated relationship between each other and more security vulnerabilities. Conventional manual inspection and debugging have been unable to meet the huge demand for system software review. At this point, this paper introduces the principle of the investigation code’s security, and proposed a new investigation module based on trusted computing technology. This module uses the trusted measurement method in trusted computing and access control method used in secure operation system, to detect some unsafe access to resources, which doesn’t meet the trusted computing standards. In this way it can avoid calling some untrusted procedure, keep malicious codes away from the system, and make the source codes meet the trusted computing standard. The module makes classifications on different codes by their actual privileges. With this module, source code can meet the trusted computing standard, and unsafe access to the system by some malicious codes could be avoided.

Key words: safety review, code review, trusted computing, credibility amount

CLC Number: