CN115934245A - Method and system for enhancing credible security of virtual machine - Google Patents

Method and system for enhancing credible security of virtual machine Download PDF

Info

Publication number
CN115934245A
CN115934245A CN202211355325.2A CN202211355325A CN115934245A CN 115934245 A CN115934245 A CN 115934245A CN 202211355325 A CN202211355325 A CN 202211355325A CN 115934245 A CN115934245 A CN 115934245A
Authority
CN
China
Prior art keywords
file
trusted
credible
verification
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211355325.2A
Other languages
Chinese (zh)
Inventor
杨祎巍
洪超
许爱东
匡晓云
杨航
梁兆楷
吕华辉
李攀登
王辉鹏
张宇南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CSG Electric Power Research Institute
Original Assignee
CSG Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CSG Electric Power Research Institute filed Critical CSG Electric Power Research Institute
Priority to CN202211355325.2A priority Critical patent/CN115934245A/en
Publication of CN115934245A publication Critical patent/CN115934245A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method and a system for enhancing the credible security of a virtual machine, wherein the method comprises the steps of obtaining a file and protecting the integrity of the file; performing static credibility verification on the file; performing dynamic credible verification on the file; and after the process is loaded, protecting the process. The method realizes static credible verification, dynamic credible verification, file integrity protection, file credible verification and process protection of the application program, so that the virtual machine has a complete credible computing function and active immunity, a safe and credible virtual machine operating environment is constructed, and attacks and intrusions of unknown bugs, trojans and viruses are effectively prevented.

Description

Method and system for enhancing credible security of virtual machine
Technical Field
The invention relates to the technical field of network security, in particular to a method and a system for enhancing the credible security of a virtual machine.
Background
Products in the power system relate to a server, a PC, an Internet of things terminal, network boundary protection equipment and a cloud platform system. For existing servers and PC devices, the software can be deployed in the forms of trusted root installation, enhanced boot program trust, system program trust and application program trust.
For the terminal equipment and the network boundary equipment of the Internet of things, equipment transformation can be carried out, a trusted root is added, and meanwhile, a bootstrap program, a system program and special application trusted verification are protected. For a management system such as a cloud platform, besides the improvement of a server, a terminal device, a PC and the like which are formed, a trusted security management center is also required to be equipped, all the formed devices are managed by the trusted security management center, and an integral trusted system is formed according to the device states.
In summary, it is imperative to construct an electric feasible security protection overall architecture and to construct a trusted security management center for performing unified and centralized trusted management on the trusted server, the trusted terminal device and the trusted virtual machine.
Disclosure of Invention
In view of the above, the present invention is proposed to provide a virtual machine trusted security enhancement method and system that overcomes or at least partially solves the above mentioned problems.
According to one aspect of the invention, a method for enhancing the trusted security of a virtual machine is provided, which comprises the following steps:
acquiring a file and protecting the integrity of the file;
performing static credibility verification on the file;
performing dynamic credible verification on the file;
and after the process is loaded, protecting the process.
Optionally, the integrity protection of the file specifically includes:
carrying out cryptographic abstract operation on the file and storing a reference value;
and adding an interception program into an operating system kernel, and prohibiting operation when writing and deleting operations are performed on the file.
Optionally, the performing static trusted verification on the file specifically includes:
measuring the file periodically to obtain a measurement value;
comparing the metric value with the reference value, judging whether the metric value is consistent with the reference value, and if so, recording the metric value as credible and verifying the metric value as credible; otherwise, it is deemed not authentic.
Optionally, the performing dynamic trusted verification on the file specifically includes:
when a program is loaded, recording a cryptography abstract for a code segment in a process, and storing the code segment as a reference value;
carrying out periodic measurement on the process to obtain a measurement value;
judging whether the metric value is consistent with the reference value, if so, recording the metric value as credible, and verifying the metric value as credible; otherwise, it is deemed not to be trusted.
Optionally, after the process is loaded, protecting the process specifically includes:
after the process is loaded, adding an interception program into an operating system kernel, and when a closing signal is sent to the process, shielding the closing signal and directly returning failure.
The invention also provides a virtual machine trusted security enhancement system, which comprises:
the system comprises a trusted VM, a system application, an operating system and a trusted verification module;
the trusted VM comprises a plurality of service applications, a trusted management interface and application layer trusted protection;
the operating system is connected with the system application;
the credibility verification module is respectively connected with the system application and the operating system and is used for carrying out static credibility verification on the file; and carrying out dynamic credible verification on the file.
The invention provides a method and a system for enhancing the credible security of a virtual machine, wherein the method comprises the steps of obtaining a file and protecting the integrity of the file; performing static credibility verification on the file; performing dynamic credible verification on the file; and after the process is loaded, protecting the process. The method realizes static credible verification, dynamic credible verification, file integrity protection, file credible verification and process protection of the application program, so that the virtual machine has a complete credible computing function and active immunity, a safe and credible virtual machine running environment is constructed, and attacks and intrusions of unknown bugs, trojans and viruses are effectively prevented.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a block diagram of a virtual machine trusted security enhancement system provided in the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terms "comprises" and "comprising," and any variations thereof, in the present description and claims and drawings are intended to cover a non-exclusive inclusion, such as a list of steps or elements.
The technical solution of the present invention is further described in detail with reference to the accompanying drawings and embodiments.
The implementation provides a virtual machine trusted security enhancement method, which comprises the following steps:
and (3) file integrity protection: after the files are subjected to cryptographic abstract operation, storing a reference value; adding an interception program into an operating system kernel, and forbidding operation when writing, deleting and other operations are performed on a file;
static credibility verification: carrying out periodic measurement on the file, comparing the measurement value with the reference value, and recording the measurement value as credible and verifying as credible when the measurement value is consistent with the reference value; otherwise, the system is regarded as not credible;
dynamic credible verification: when a program is loaded, recording a cryptography abstract for a code segment in a process, and storing the code segment as a reference value; then, carrying out periodic measurement on the process, comparing the measurement value with the reference value, and recording the measurement value as credible and verifying as credible when the measurement value is consistent with the reference value; otherwise, the system is regarded as not credible;
process protection: after the process is loaded, adding an interception program into an operating system kernel, and when a closing signal is sent to the process, shielding the closing signal and directly returning failure.
As shown in fig. 1, a virtual machine trusted security enhancement system includes:
the system comprises a trusted VM, a system application, an operating system and a trusted verification module;
the trusted VM comprises a plurality of service applications, a trusted management interface and application layer trusted protection;
the operating system is connected with the system application;
the credibility verification module is respectively connected with the system application and the operating system and is used for carrying out static credibility verification on the file; and performing dynamic credible verification on the file.
Enhancing the credibility of the virtual machine operating system: the trusted verification module in the operating system performs the functions of static trusted verification, dynamic trusted verification, file integrity protection, file trusted verification and process protection trusted enhancement on the operating system of the virtual machine, thereby ensuring the security of the operating system of the virtual machine.
Application trust enhancement: through a security enhancement function interface provided by the virtual machine operating system, static trusted verification is carried out on the application starting process, dynamic trusted verification is carried out on the execution process, integrity protection is carried out on key files and data, and trusted security protection on the application program on the virtual machine is achieved.
Has the advantages that: the method realizes static credible verification, dynamic credible verification, file integrity protection, file credible verification and process protection of the application program, so that the virtual machine has a complete credible computing function and active immunity, a safe and credible virtual machine operating environment is constructed, and attacks and intrusions of unknown bugs, trojans and viruses are effectively prevented.
The above embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above embodiments are only examples of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. A virtual machine trusted security enhancement method is characterized in that the enhancement method comprises the following steps:
acquiring a file and protecting the integrity of the file;
performing static credibility verification on the file;
performing dynamic credible verification on the file;
and after the process is loaded, protecting the process.
2. The method for enhancing trusted security of virtual machine according to claim 1, wherein the integrity protection of the file specifically includes:
carrying out cryptographic abstract operation on the file and storing a reference value;
and adding an interception program into an operating system kernel, and prohibiting operation when writing and deleting operations are performed on the file.
3. The method for enhancing the trusted security of the virtual machine according to claim 2, wherein the performing the static trusted verification on the file specifically includes:
carrying out periodic measurement on the file to obtain a measurement value;
comparing the metric value with the reference value, judging whether the metric value is consistent with the reference value, and if so, recording the metric value as credible and verifying the metric value as credible; otherwise, it is deemed not to be trusted.
4. The method for enhancing the trusted security of the virtual machine according to claim 1, wherein the performing the dynamic trusted verification on the file specifically includes:
when a program is loaded, recording a cryptography abstract for a code segment in a process, and storing the code segment as a reference value;
carrying out periodic measurement on the process to obtain a measurement value;
judging whether the metric value is consistent with the reference value, if so, recording the metric value as credible, and verifying the metric value as credible; otherwise, it is deemed not to be trusted.
5. The method for enhancing the trusted security of the virtual machine according to claim 1, wherein after the process is loaded, the protecting the process specifically includes:
after the process is loaded, adding an interception program into an operating system kernel, and when a closing signal is sent to the process, shielding the closing signal and directly returning to failure.
6. A virtual machine trusted security enforcement system, the enforcement system comprising: the system comprises a trusted VM, a system application, an operating system and a trusted verification module;
the trusted VM comprises a plurality of service applications, a trusted management interface and application layer trusted protection;
the operating system is connected with the system application;
the credibility verification module is respectively connected with the system application and the operating system and is used for carrying out static credibility verification on the file; and performing dynamic credible verification on the file.
CN202211355325.2A 2022-11-01 2022-11-01 Method and system for enhancing credible security of virtual machine Pending CN115934245A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211355325.2A CN115934245A (en) 2022-11-01 2022-11-01 Method and system for enhancing credible security of virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211355325.2A CN115934245A (en) 2022-11-01 2022-11-01 Method and system for enhancing credible security of virtual machine

Publications (1)

Publication Number Publication Date
CN115934245A true CN115934245A (en) 2023-04-07

Family

ID=86699735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211355325.2A Pending CN115934245A (en) 2022-11-01 2022-11-01 Method and system for enhancing credible security of virtual machine

Country Status (1)

Country Link
CN (1) CN115934245A (en)

Similar Documents

Publication Publication Date Title
Kil et al. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
EP2788912B1 (en) Predictive heap overflow protection
US10547626B1 (en) Detecting repackaged applications based on file format fingerprints
US8776196B1 (en) Systems and methods for automatically detecting and preventing phishing attacks
US9294284B1 (en) Systems and methods for validating application signatures
US9270467B1 (en) Systems and methods for trust propagation of signed files across devices
Canfora et al. Composition-malware: building android malware at run time
US10771477B2 (en) Mitigating communications and control attempts
CN107408176A (en) The execution of malicious objects dissects detection
EP3270318B1 (en) Dynamic security module terminal device and method for operating same
Schmidt et al. Malware detection and kernel rootkit prevention in cloud computing environments
US20150007332A1 (en) Systems and methods for directing application updates
CN111989679A (en) Injecting trap code in an execution path of a process executing a program to generate a trap address range to detect potentially malicious code
Akram et al. How to build a vulnerability benchmark to overcome cyber security attacks
Biggs et al. The jury is in: Monolithic os design is flawed: Microkernel-based designs improve security
CN109684829B (en) Service call monitoring method and system in virtualization environment
US10262131B2 (en) Systems and methods for obtaining information about security threats on endpoint devices
Kaczmarek et al. Operating system security by integrity checking and recovery using write‐protected storage
Biggs et al. The jury is in: Monolithic OS design is flawed
CN110659478B (en) Method for detecting malicious files preventing analysis in isolated environment
CN115934245A (en) Method and system for enhancing credible security of virtual machine
Kim et al. Extending a hand to attackers: browser privilege escalation attacks via extensions
Wang et al. Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software.
CN113076542A (en) Test management system for trusted computing in artificial intelligence
Abdullah et al. Towards a dynamic file integrity monitor through a security classification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination