DOI QR코드

DOI QR Code

보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩

Software-based Encryption Pattern Bootstrap for Secure Execution Environment

  • 투고 : 2012.12.09
  • 심사 : 2012.12.17
  • 발행 : 2012.12.31

초록

현재 대부분 시스템은 부트 펌웨어에 대한 보안 취약점이 무시되어 왔다. 부트 펌웨어는 하드웨어 제어 권한과 다른 외부 장치의 권한을 가지고 있기 때문에 보안 메커니즘이 고려되지 않은 상태에서는 악의적인 프로그램이나 코드에 의해 하드웨어가 제어되고 악의적인 코드에 의해 운영체제 손상, 프로그램 도용과 같은 심각한 시스템의 오류를 초래할 가능성이 높다. 본 논문에서는 부트 펌웨어에 대한 신뢰성을 제공하기 위해 악의적인 코드 탐색과 프로그램 도용방지, 운영체제의 보안 로드를 위하여 기존 부트스트랩 방식에 벗어난 암호화된 부트스트랩 패턴을 가지는 소프트웨어 기반의 구조적 보안 메커니즘을 제안한다. 또한 실험 결과를 통해 다른 소프트웨어 보안 메커니즘 비해 적은 1.5~3% 사이의 오버헤드와 검출능력의 우수함을 입증한다.

Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

키워드

참고문헌

  1. Trusted Computing Group, "TCG TPM Specification, Version 1.2, Revision 103," https://www.trustedcomputinggroup.org/specs/TPM, 2007.
  2. W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A Secure and Reliable Bootstrap Architecture," in IEEE Symposium on Security and Privacy. IEEE, 1997, pp. 65-1.
  3. K. Shimizu, "The Cell Broadband Engine Processor Security Architecture," http://www.ibm.com/developerworks/power/library/ pa-cellsecurity/, Apr. 2006.
  4. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004.
  5. S. Rabi, A. Raghunathan, and S. Chakradhar. "Temper Resistance Mechanisms for Secure Embedded Systems", in Proc. int. Conf. ,Jan. 2004.
  6. Eric James Lorden. "A Secure Software Platform for Real-Time Embedded Systems", Bradley Department of Electrical and Computer Engineering Blacksburg, Virginia December 15, 2006
  7. Vulnerability notes database, CERT coordinationcenter: http://www.kb.cert.org/vuls/, 2006.
  8. Black, Paul E. F, "Fisher-Yates shuffle", Dictionary of Algorithms and Data Structures, National Institute of Standards and Technology, Retrieved 2007-08-09.
  9. Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe. "Secure Execution Via Program Shepherding." MIT Press, 2002, pp. 191-206.
  10. E. Naess, D. A. Frincke, A. D. McKinnon, and D. E. Bakken, "Configurable middlewarelevel intrusion detection for embedded systems," International Workshop on Security in Distributed Computing Systems, vol. 02, pp. 144-151, 2005