<th id="5nh9l"></th><strike id="5nh9l"></strike><th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th><strike id="5nh9l"></strike>
<progress id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"><noframes id="5nh9l">
<th id="5nh9l"></th> <strike id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span>
<progress id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span><strike id="5nh9l"><noframes id="5nh9l"><strike id="5nh9l"></strike>
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"></span><span id="5nh9l"><video id="5nh9l"></video></span>
<th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th>
<progress id="5nh9l"><noframes id="5nh9l">

面向關鍵信息基礎設施的軟件準入許可與行為管控方法

Software access licensing and behavior control method for critical information infrastructure

  • 摘要: 針對關鍵信息基礎設施中軟件部署許可及其運行時行為監管缺失的問題,傳統網絡監管及訪控機制因缺乏對軟件的許可機制與代碼段完整性的動態驗證,難以防范惡意篡改和未授權運行等安全風險. 因此,本文提出一種軟件行為管控機制,能對獲取資源數據所用軟件運行時加載代碼段的完整性監控,以保證軟件在使用過程中遵守規范,防止軟件運行時代碼篡改、未經授權運行等惡意行為發生. 進而從零信任架構模型出發,提出了一種基于軟件存證的軟件行為管控方案,該方案采用橢圓曲線上雙線性映射的同態聚合盲認證方法,通過對軟件中指定字節碼進行標記、生成可驗證密碼憑證并存入所發放的軟件部署許可中. 在軟件運行期間,實時抓取該軟件運行時代碼段中的字節碼,采用密碼學的盲驗證方式,即在監管系統無需獲取字節碼的“原始軟件不出域、軟件可控可評估”前提下,完成與許可證中密碼憑證的有效校驗,解決在訪問控制中關鍵信息基礎設施上軟件行為的有效管控問題. 實驗結果表明:該方案可有效檢測內存中的惡意篡改行為、未授權執行等安全風險,為關鍵信息基礎設施中軟件行為的實時監管提供了一種可存證、可審計的安全解決方案.

     

    Abstract: Critical information infrastructures (CIIs) serve as the vital cornerstone of a country’s economic and social operation, and they constitute the crucial protection for national security and public benefits. Within CIIs, implementing strict software deployment licensing and runtime behavior regulation is essential to ensure the security and stability of systems while preventing malicious acts from within. Otherwise, the absence of such functions would lead to significant security risks. Traditional network monitoring and access control mechanisms are ineffective in preventing threats such as malicious tampering and unauthorized execution, as they lack dynamic verification of software licensing and code segment integrity. To address this issue, this study proposes a software behavior control mechanism that monitors the integrity of runtime-loaded code segments used by software to access resource data. This ensures that the software adheres to regulations during use and prevents malicious actions, such as code tampering and unauthorized execution. Based on the concept of zero-trust architecture, it introduces a software behavior control scheme using software evidence preservation, which shifts from traditional boundary protection to resource-centered protection. All computational services are treated as resources, and each resource must undergo security evaluation and continuous monitoring. Specifically, the scheme divides the current system into two parts: data interface and control interface. The control interface is responsible for making access decisions and includes software endorsement, software certification, and software monitoring nodes. The data interface receives the control interface’s decisions and performs the corresponding operations. In the control interface, the software endorsement point retrieves the software package uploaded by the resource host and pre-executes the program to simulate its operations. By marking specific bytecodes, generating software evidence, and storing it on the inter planetary file system, blind authentication and evidence preservation of the software are achieved. The software supervision point receives user access requests and verifies the software’s integrity and legitimacy at runtime via the software authentication point (SAP). The SAP uses a blind authentication algorithm to verify if the software has been tampered with or exhibits any anomalies. The daemon process, acting as a prover, uses the software evidence stored in the blockchain to capture and verify runtime code segments, ensuring that the software behavior complies with regulatory and licensing requirements. The proposed scheme uses a homomorphic aggregate blind authentication method based on bilinear mapping on elliptic curves. It marks specific bytecodes in the software, generates verifiable cryptographic credentials, and stores them in the software deployment license. During software execution, bytecode in the runtime code segments is captured in real time, and cryptographic blind verification is used to validate these credentials against those stored in the license. This approach resolves the software behavior control issue without requiring access to the original bytecode, ensuring the security of CII. The proposed software behavior control scheme has been deployed and operated on the Beijing Government Data Cloud Platform, completing security assessments, license issuance, and runtime behavior monitoring for more than 200 applications. The results demonstrate that this scheme can effectively detect malicious tampering and unauthorized execution risks in memory. It provides a verifiable and auditable security solution for the real-time monitoring of software behavior in CII.

     

/

返回文章
返回
<th id="5nh9l"></th><strike id="5nh9l"></strike><th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th><strike id="5nh9l"></strike>
<progress id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"><noframes id="5nh9l">
<th id="5nh9l"></th> <strike id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span>
<progress id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span><strike id="5nh9l"><noframes id="5nh9l"><strike id="5nh9l"></strike>
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"></span><span id="5nh9l"><video id="5nh9l"></video></span>
<th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th>
<progress id="5nh9l"><noframes id="5nh9l">
259luxu-164