1

Similar documents
( )


Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

21 Key Exchange method for portable terminal with direct input by user

23

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

Insight International

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 / 1 idrac8 CPU 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2 SP1 Microsoft Windows S

Vol.53 No (Feb. 2012) IaaS 1 1 1, , IaaS VM VM VM VM VM VM IaaS VM IaaS FBCrypt FBCrypt VNC VMM VM VM FBCrypt Xen TightVNC S

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) Vocaloid PV YouTube 1 minato minato ussy 3D MAD F EDis ussy

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

Copyright 2001 by Junichi Sawase


IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

guideline_1_0.dvi

04.™ƒ”R/’Ô”�/’Xfl©

1 2 3 マルチメディア, 分散, 協調とモバイル (DICOMO2013) シンポジウム 平成 25 年 7 月.,.,,.,. Surrogate Diner,., Surrogate Diner,, 3,, Surrogate Diner. An Interface Agent for Ps

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

Microsoft PowerPoint - RCIS2008_Suzaki

dsample.dvi

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi

untitled

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The

1 GPU GPGPU GPU CPU 2 GPU 2007 NVIDIA GPGPU CUDA[3] GPGPU CUDA GPGPU CUDA GPGPU GPU GPU GPU Graphics Processing Unit LSI LSI CPU ( ) DRAM GPU LSI GPU

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

_先端融合開発専攻_観音0314PDF用

(2) (1) 4 24 NTT Super Cash < 1 May.2001)

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

Microsoft Word - archip.doc

Cisco WebEx ホワイトペーパー: リアルタイムコラボレーションのパワーを解き放つ: Cisco WebEx ソリューションのセキュリティ概要

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

26 FPGA FPGA (Field Programmable Gate Array) ASIC (Application Specific Integrated Circuit) FPGA FPGA FPGA FPGA Linux FreeDOS skewed way L1

特集_03-07.Q3C

VM VM VM VM I/O UVBond VM % 3.2% 2 VM 3 UVBond VM VM VM VM VM VM SSH VNC VM Google [16] 28% [11] 35% [4] VM 1 IaaS VM VM VM VM VM [5]

Lyra X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) (

本機をお使いの方へ

2

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Computer Security Symposium October 2013 Android OS kub

paper

Ver. 3.7 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT,

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS

untitled

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

橡Webcamユーザーガイド03.PDF

2014 2

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

Infoprint 250 GA

YMS-VPN1_User_Manual

Pro 16 ipad iphone Windows Mac Web App : 12,600 T1 1 1 * Starter Solution Excel PDF Web Web CSV, Excel, XML, ODBC ODBC / JDBC ** SQL REST API (JSON, c

P2P P2P peer peer P2P peer P2P peer P2P i

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

IPSJ SIG Technical Report Vol.2014-MBL-70 No.20 Vol.2014-UBI-41 No /3/14 1,a) Yuko Hirabe 1,a) Mai Tsuda 1 Yutaka Arakawa 1 Keiichi Yasum

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

rzamhpdf.ps

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish

IPSJ SIG Technical Report Vol.2011-CE-110 No /7/9 Bebras 1, 6 1, 2 3 4, 6 5, 6 Bebras 2010 Bebras Reporting Trial of Bebras Contest for K12 stud

知能と情報, Vol.30, No.5, pp

Table 1 Table 2

43_08.dvi

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

Microsoft PowerPoint - TCG-JRF 講演公開資料 (Lenovo 宮口)

BCCE製品ガイド

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

11U Dell CPU RAID 1U 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2/2008 R2 SP1 Standar

, IT.,.,..,.. i

IBISML 20 (IBIS2017) 6 IBISML 4 CANDAR2017 (Graph Golf 2017) CW WSSM AI Author s Toolkit Writing Better Techn

An Interactive Visualization System of Human Network for Multi-User Hiroki Akehata 11N F

2011 : M Schell Interest curve Schell Chan FPS Schell Interest curve Chan FPS Chan Chan Chan Chan

: Name, Tel name tel (! ) name : Name! Tel tel ( % ) 3. HTML. : Name % Tel name tel 2. 2,., [ ]!, [ ]!, [ ]!,. [! [, ]! ]!,,. ( [ ], ),. : [Name], nam

Run-Based Trieから構成される 決定木の枝刈り法

I. Opal SSC 1. Opal SSC 2. Opal Storage 3. Opal Storage MBR Shadowing 6. SP II. TCG Opal SSC HDD 9. Opal SSC HDD *1. TCG: Trusted Computin

WISS 2008 [2] PowerPoint[7] KeyNote[8] ZUI(Zooming User Interface) ZUI 1. : Pad[9] CounterPoint[10] KidPad[11] ( ); ( ). [12] 3 4 [12] 5 3 TabletPC 2

JAIST Reposi Title 既存曲に合わせて口す さまれる即興歌唱を利用した 音楽創作支援手法に関する研究 Author(s) 柳, 卓知 Citation Issue Date Type Thesis or Dissertation Te

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

科技表紙PDF200603

EQUIUM EQUIUM 1

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener

Transcription:

VM Secure Processor for Protecting VM and its Application to Authentication 26 2 6 48-126444

1

OS OS TPM Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS OS OS OS OS VM VM 2

1 1 2 3 2.1 DRM................................... 3 2.1.1............................. 3 2.1.2 DRM.................... 3 2.1.3 DRM.................... 4 2.2.......................... 4 2.2.1............ 4 2.3 TPM TrustedBoot...................... 5 2.3.1 TrustedBoot........................... 5 2.3.2 TPM TrustedBoot........ 7 3 VM 9 3.1.......................... 9 3.1.1............... 9 3.1.2............... 9 3.1.3............ 11 3.2 VM........................ 11 3.2.1 VM............................ 12 3.2.2................... 12 3.2.3 VM............... 12 4 VM 13 4.1....................... 13 4.1.1........................... 13 4.1.2........................... 13 4.1.3.......................... 14 4.1.4.......................... 15 4.2........................ 15 4.2.1............... 15 i

4.2.2................ 15 4.2.3......................... 15 4.3............................... 16 4.4.............. 18 5 19 5.1............................. 19 5.2.......................... 20 5.3............................. 21 6 23 6.1................... 23 6.2 TPM Trusted Boot............ 23 7 25 7.1.................................. 25 7.2............................... 25 29 ii

2.1 IBM 4758................................ 5 2.2 TPM Trusted Boot...................... 6 2.3.......................... 8 3.1.................... 10 3.2 Page Table Entry............................ 11 4.1............................... 14 4.2............................... 16 4.3............. 17 5.1 OS....... 20 5.2.................. 20 5.3................ 21 5.4.................. 21 5.5.................. 22 6.1 TPM Trusted Boot............ 24 iii

1 [1] [2] OS OS OS DRM TPM Trusted Boot TPM[9, 10] Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS 1

OS VM VM 2 3 VM 4 VM 5 6 7 2

2 2.1 DRM (Digital Rights Management : DRM) [3, 4] DRM DRM [5, 6] 2.1.1 DRM 2 ID PC ID PC OS 2.1.2 DRM DRM DVD CSS DVD. 3

OS DRM OS OS OS OS OS 2.1.3 DRM DRM DRM [7] OS OS DRM 2.2 IBM 4758 cryptograph coprosessor 1997 IBM PCI 2.1 Intel i486 DES DRAM RAM FLASH ROM IBM 4758 cryptograph coprosessor CPU Intel i486 2.2.1 4

2.1: IBM 4758 1 2.3 TPM TrustedBoot TPM Trusted Boot 2.3.1 TrustedBoot TPM TPM Trusted Boot 5

2.2: TPM Trusted Boot Trusted Boot TPM [14] Trusted Boot 2.2 BIOS CRTM(Core Root of Trust Measurement) OS PCR(Platform Configuration Register) TPM CRTM CRTM TPM CRTM CRTM CRTM TPM CRTM BIOS PCR PCR TPM PCR PCR 6

TPM 2.3.2 TPM TrustedBoot TPM TrustedBoot CRTM BIOS TPM OS OS TPM Trusted Boot OS OS OS TPM Trusted Boot OS TPM Trusted Boot 2.3 7

2.3: 8

3 VM VM 3.1 OS OS [15] 3.1.1 3.1.2 9

3.1: Lie XOM[16, 17] OS 3.1 AEGIS Suh AEGIS[18] [19, 20, 21] 3.2 10

3.2: Page Table Entry 3.1.3 OS OS OS OS 3.2 VM VM VM VM VM VM VM OS VM 11

3.2.1 VM VM VM VM VM VM VM VM VM VM VM 3.2.2 VM VM VM VM VM VM VM VM VM OS OS VM 3.2.3 VM VM VM OS VM VM VM 12

4 VM 4.1 VM OS 4.1 4.1.1 AES[22] m S R key S R key S R m m key ce m ce m ckenc key (m) (4.1) 4.1.2 RSA[23] S R pk sk S m R sk S m sk S S pk S m 13

4.1: m sk S sd m sd m sig sks (m) (4.2) S R pk R m pk R R sk R pk R m pe m pe m pkenc pkr (m) (4.3) 4.1.3 SHA[24]. m hd m hd m hash(m) (4.4) 14

4.1.4 m 1 m 2 m 12 m 12 m 1 m 2 (4.5) 4.2 4.2.1 VM P pk P sk P pk P P pk M pk P sk P P 4.2.2 OS OS A OS A X pk X pk X A pk X 4.2.3 otk 15

4.2: 4.3 4.2 4.2 1. A A hash(d) P hd d hash(d) (4.6) d A d 4.2.2 pk X 4.1.3 2. P hd d P sk P hd d sig skp (hash(d)) A. sd d sig skp (hash(d)) (4.7) 4.1.2 4.2.1 P sk P pk P P 16

4.3: 3. A otk. 4.2.3 4. 4.3 A sd d pk P otk pk X pkenc pkx (otk pk P sd d ) X. pe d pkenc pkx (otk pk P sd d ) (4.8) 4.1.2 5. X X sk X pe d 6. X P pk M pk P P P pk P sd d P. 7. sd d X hd d hd d X t otk ckenc otk (t) A. ce t ckenc otk (t) (4.9) 4.1.1 8. A otk ce t t. t 9. A t 17

4.4 18

5 3 1. 2. 3. 3 5.1 2 1. 2. P A pe d pkenc pkx (otk pk P sd d ) pk P 4.2.1 X pk P pk M pk P sd d P 19

5.1: OS 5.2 5.2: 3 1. 5.1 OS 2. 3. 4. 1. VM 2. 5.2 A 4.1.3 A pe d pkenc pkx (otk pk P sd d ) 5.3 A 4.2.2 A X pk X pe d 3. 20

5.3: 5.3 5.4: ce t otk 4.1.1 otk 4.2.3 otk otk A X ce t A A A otk X A ce t 5.4 5.5 pe d X ce t 21

5.5: 22

6 6.1 [11] [12] [13] OS VM VM 6.2 TPM Trusted Boot TPM Trusted Boot 6.1 TPM Trusted Boot BIOS Boot Loader 6.1 VM BIOS Boot Loader OS 23

6.1: TPM Trusted Boot 24

7 7.1 OS VM OS OS 7.2 VM 25

[1]. recent trends in broadband contents sharing platform. [2],,,..,, vol. 109, no. 237, pp. 7-12, 2009. [3] P. A. Jamkhedkar and G. L. Heileman. Drm as a layered system, DRM 04:Proceedings of the 4th ACM workshop on Digital rights management, New York, NY, USA, ACM Press, pp. 11-21 2004. [4] W. Ku and C.-H. Chi. Survey on the technological aspects of digital rights management, ISC, pp. 391-403 2004. [5] Q. Liu, R. Safavi-Naini and N. P. Sheppard. Digital rights management for content distribution, CRPITS 03: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Darlinghaust, Australia, Australian Computer Society, Inc., pp. 49-58 2003. [6] M. L. Smith. Digital rights managements protecting the digital media value chain, MUM 04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia, New York, NY, USA, ACM Press, pp. 187-191 2004. [7] T. Hauser and C. Wenz. Drm unter attack: Weaknesses in exsting systems, Digital Rights Management, pp. 206-223 2003. [8] IBM. IBM PCI Cryptographic Coprocessor http://www- 03.ibm.com/security/cryptocards/pcicc/overview.shtml [9] Trusted Computing Group. TCG Specification Architecture Overview. [10] Trusted Computing Group. TPM Specification Version 1.2 Revision 103. [11],, : OS, CPSY2012-11, Vol. 112, No. 173 pp. 13-18 2012). 26

[12] Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai. Minimal Additional Function to Secure Processor for Application Authentication. WEWoRC 2013. [13]. CSS 2013. [14],,, Nguyen Anh Quynh,. Knoppix trusted computing. [15],. OS., Vol.45, No.3, March 2004. [16] Dan Boneh, David Lie, Pat Lincoln, Lohn Mitchell, and Mark Mitchell. Hardware support for tamper-resistatnt and copy-resistant software. Technical report, Stanford University Computer Science, 1999. [17] David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Proceedings of ACM Symposium on Operating Systems Principles, 2003. [18] G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamperevident and tamper-resistant processing. In International Conference on Supercomputing, 2003. [19],,,.. 2007 no.17, pp. 239 244, 2007. [20],,,.., CPSY2009-29, vol.109, no.237, pp. 13 18, 2009. [21], CPSY2011-12, vol.111, no.163 pp.19 24 2011 [22] National Institute of Standards and Technology. Federal Information Processing Standards Publication 197 ADVANCED ENCRYPTION STANDARD (AES), November 26, 2001. [23] Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2(Feb. 1978), 120-126. 27

[24] National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-4 SECURE HASH STANDARD (SHS), March, 2012. 28

1. VM,,, SCIS 2014(2014). 2.,,, CSS 2013(2013). 3. Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai Minimal Additional Function to Secure Processor for Application Authentication WEWoRC 2013(2013). 4.,, OS CPSY2012-11(2012). 5. 74 (2012). 1. A Cloud Architecture for Protecting Guest s Information from Malicious Operators with Memory Management Koki Murakami, Tsuyoshi Yamada, Rie Yamaguchi, Masahiro Goshima and Shuichi Sakai CODASPY 2014(2014). 29

2.,,,, SCIS 2014(2014). 3.,,,, CSS 2013(2013). 30

31