VM Secure Processor for Protecting VM and its Application to Authentication 26 2 6 48-126444
1
OS OS TPM Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS OS OS OS OS VM VM 2
1 1 2 3 2.1 DRM................................... 3 2.1.1............................. 3 2.1.2 DRM.................... 3 2.1.3 DRM.................... 4 2.2.......................... 4 2.2.1............ 4 2.3 TPM TrustedBoot...................... 5 2.3.1 TrustedBoot........................... 5 2.3.2 TPM TrustedBoot........ 7 3 VM 9 3.1.......................... 9 3.1.1............... 9 3.1.2............... 9 3.1.3............ 11 3.2 VM........................ 11 3.2.1 VM............................ 12 3.2.2................... 12 3.2.3 VM............... 12 4 VM 13 4.1....................... 13 4.1.1........................... 13 4.1.2........................... 13 4.1.3.......................... 14 4.1.4.......................... 15 4.2........................ 15 4.2.1............... 15 i
4.2.2................ 15 4.2.3......................... 15 4.3............................... 16 4.4.............. 18 5 19 5.1............................. 19 5.2.......................... 20 5.3............................. 21 6 23 6.1................... 23 6.2 TPM Trusted Boot............ 23 7 25 7.1.................................. 25 7.2............................... 25 29 ii
2.1 IBM 4758................................ 5 2.2 TPM Trusted Boot...................... 6 2.3.......................... 8 3.1.................... 10 3.2 Page Table Entry............................ 11 4.1............................... 14 4.2............................... 16 4.3............. 17 5.1 OS....... 20 5.2.................. 20 5.3................ 21 5.4.................. 21 5.5.................. 22 6.1 TPM Trusted Boot............ 24 iii
1 [1] [2] OS OS OS DRM TPM Trusted Boot TPM[9, 10] Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS 1
OS VM VM 2 3 VM 4 VM 5 6 7 2
2 2.1 DRM (Digital Rights Management : DRM) [3, 4] DRM DRM [5, 6] 2.1.1 DRM 2 ID PC ID PC OS 2.1.2 DRM DRM DVD CSS DVD. 3
OS DRM OS OS OS OS OS 2.1.3 DRM DRM DRM [7] OS OS DRM 2.2 IBM 4758 cryptograph coprosessor 1997 IBM PCI 2.1 Intel i486 DES DRAM RAM FLASH ROM IBM 4758 cryptograph coprosessor CPU Intel i486 2.2.1 4
2.1: IBM 4758 1 2.3 TPM TrustedBoot TPM Trusted Boot 2.3.1 TrustedBoot TPM TPM Trusted Boot 5
2.2: TPM Trusted Boot Trusted Boot TPM [14] Trusted Boot 2.2 BIOS CRTM(Core Root of Trust Measurement) OS PCR(Platform Configuration Register) TPM CRTM CRTM TPM CRTM CRTM CRTM TPM CRTM BIOS PCR PCR TPM PCR PCR 6
TPM 2.3.2 TPM TrustedBoot TPM TrustedBoot CRTM BIOS TPM OS OS TPM Trusted Boot OS OS OS TPM Trusted Boot OS TPM Trusted Boot 2.3 7
2.3: 8
3 VM VM 3.1 OS OS [15] 3.1.1 3.1.2 9
3.1: Lie XOM[16, 17] OS 3.1 AEGIS Suh AEGIS[18] [19, 20, 21] 3.2 10
3.2: Page Table Entry 3.1.3 OS OS OS OS 3.2 VM VM VM VM VM VM VM OS VM 11
3.2.1 VM VM VM VM VM VM VM VM VM VM VM 3.2.2 VM VM VM VM VM VM VM VM VM OS OS VM 3.2.3 VM VM VM OS VM VM VM 12
4 VM 4.1 VM OS 4.1 4.1.1 AES[22] m S R key S R key S R m m key ce m ce m ckenc key (m) (4.1) 4.1.2 RSA[23] S R pk sk S m R sk S m sk S S pk S m 13
4.1: m sk S sd m sd m sig sks (m) (4.2) S R pk R m pk R R sk R pk R m pe m pe m pkenc pkr (m) (4.3) 4.1.3 SHA[24]. m hd m hd m hash(m) (4.4) 14
4.1.4 m 1 m 2 m 12 m 12 m 1 m 2 (4.5) 4.2 4.2.1 VM P pk P sk P pk P P pk M pk P sk P P 4.2.2 OS OS A OS A X pk X pk X A pk X 4.2.3 otk 15
4.2: 4.3 4.2 4.2 1. A A hash(d) P hd d hash(d) (4.6) d A d 4.2.2 pk X 4.1.3 2. P hd d P sk P hd d sig skp (hash(d)) A. sd d sig skp (hash(d)) (4.7) 4.1.2 4.2.1 P sk P pk P P 16
4.3: 3. A otk. 4.2.3 4. 4.3 A sd d pk P otk pk X pkenc pkx (otk pk P sd d ) X. pe d pkenc pkx (otk pk P sd d ) (4.8) 4.1.2 5. X X sk X pe d 6. X P pk M pk P P P pk P sd d P. 7. sd d X hd d hd d X t otk ckenc otk (t) A. ce t ckenc otk (t) (4.9) 4.1.1 8. A otk ce t t. t 9. A t 17
4.4 18
5 3 1. 2. 3. 3 5.1 2 1. 2. P A pe d pkenc pkx (otk pk P sd d ) pk P 4.2.1 X pk P pk M pk P sd d P 19
5.1: OS 5.2 5.2: 3 1. 5.1 OS 2. 3. 4. 1. VM 2. 5.2 A 4.1.3 A pe d pkenc pkx (otk pk P sd d ) 5.3 A 4.2.2 A X pk X pe d 3. 20
5.3: 5.3 5.4: ce t otk 4.1.1 otk 4.2.3 otk otk A X ce t A A A otk X A ce t 5.4 5.5 pe d X ce t 21
5.5: 22
6 6.1 [11] [12] [13] OS VM VM 6.2 TPM Trusted Boot TPM Trusted Boot 6.1 TPM Trusted Boot BIOS Boot Loader 6.1 VM BIOS Boot Loader OS 23
6.1: TPM Trusted Boot 24
7 7.1 OS VM OS OS 7.2 VM 25
[1]. recent trends in broadband contents sharing platform. [2],,,..,, vol. 109, no. 237, pp. 7-12, 2009. [3] P. A. Jamkhedkar and G. L. Heileman. Drm as a layered system, DRM 04:Proceedings of the 4th ACM workshop on Digital rights management, New York, NY, USA, ACM Press, pp. 11-21 2004. [4] W. Ku and C.-H. Chi. Survey on the technological aspects of digital rights management, ISC, pp. 391-403 2004. [5] Q. Liu, R. Safavi-Naini and N. P. Sheppard. Digital rights management for content distribution, CRPITS 03: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Darlinghaust, Australia, Australian Computer Society, Inc., pp. 49-58 2003. [6] M. L. Smith. Digital rights managements protecting the digital media value chain, MUM 04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia, New York, NY, USA, ACM Press, pp. 187-191 2004. [7] T. Hauser and C. Wenz. Drm unter attack: Weaknesses in exsting systems, Digital Rights Management, pp. 206-223 2003. [8] IBM. IBM PCI Cryptographic Coprocessor http://www- 03.ibm.com/security/cryptocards/pcicc/overview.shtml [9] Trusted Computing Group. TCG Specification Architecture Overview. [10] Trusted Computing Group. TPM Specification Version 1.2 Revision 103. [11],, : OS, CPSY2012-11, Vol. 112, No. 173 pp. 13-18 2012). 26
[12] Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai. Minimal Additional Function to Secure Processor for Application Authentication. WEWoRC 2013. [13]. CSS 2013. [14],,, Nguyen Anh Quynh,. Knoppix trusted computing. [15],. OS., Vol.45, No.3, March 2004. [16] Dan Boneh, David Lie, Pat Lincoln, Lohn Mitchell, and Mark Mitchell. Hardware support for tamper-resistatnt and copy-resistant software. Technical report, Stanford University Computer Science, 1999. [17] David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Proceedings of ACM Symposium on Operating Systems Principles, 2003. [18] G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamperevident and tamper-resistant processing. In International Conference on Supercomputing, 2003. [19],,,.. 2007 no.17, pp. 239 244, 2007. [20],,,.., CPSY2009-29, vol.109, no.237, pp. 13 18, 2009. [21], CPSY2011-12, vol.111, no.163 pp.19 24 2011 [22] National Institute of Standards and Technology. Federal Information Processing Standards Publication 197 ADVANCED ENCRYPTION STANDARD (AES), November 26, 2001. [23] Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2(Feb. 1978), 120-126. 27
[24] National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-4 SECURE HASH STANDARD (SHS), March, 2012. 28
1. VM,,, SCIS 2014(2014). 2.,,, CSS 2013(2013). 3. Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai Minimal Additional Function to Secure Processor for Application Authentication WEWoRC 2013(2013). 4.,, OS CPSY2012-11(2012). 5. 74 (2012). 1. A Cloud Architecture for Protecting Guest s Information from Malicious Operators with Memory Management Koki Murakami, Tsuyoshi Yamada, Rie Yamaguchi, Masahiro Goshima and Shuichi Sakai CODASPY 2014(2014). 29
2.,,,, SCIS 2014(2014). 3.,,,, CSS 2013(2013). 30
31