期刊文献+

BIOS校验的可信操作系统启动方法 被引量:2

A Trusted Operating System Boot Method Based on BIOS Authentication
在线阅读 下载PDF
导出
摘要 广电网络中的操作系统,决定了主机安全防护系统中安全防护功能的有效性和自身程序的安全性。文中设计了一种基于BIOS校验的可信操作系统启动方法,通过对操作系统的身份验证来保证可信的操作系统被正确启动,同时运用文件分配表隐藏技术来防止操作系统被破坏和保护硬盘数据。该法校验准确性较高,且数据安全性较好。 In the broadcast television network,for host security protection systems,the effectiveness of the security protection and the security of the own procedures depend on the operating system. Based on BIOS authentication,this paper designs a trusted operating system boot method for the trust operating system to boot properly throughout the authentication on the operating system. The hidden file allocation tables( FAT) technology is adopted to prevent the operating system the data in the hard disk from being damaged. This method offers good accuracy and data security.
作者 刘炜
出处 《电子科技》 2016年第7期88-90,101,共4页 Electronic Science and Technology
关键词 安全防护 BIOS校验 可信操作系统 文件分配表隐藏 security protection BIOS authentication trusted operating system FAT hide
  • 相关文献

参考文献6

二级参考文献15

  • 1李昊,王跃科,周睿,潘仲明.CF卡在大容量数据存储系统的典型应用[J].微计算机信息,2005,21(11S):66-68. 被引量:13
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:363
  • 3Liang A-lei,Liu Ke-jia,Li Xiao-yong,et al.FATrY:a reliable FAT file system[C]//Proceedings of the lOth EUROMICRO Conference on Digital System Design, Luebeck,Germany. [S.l.] : IEEE Computer Society Press,2007,1:390-395.
  • 4Niranjan T,Chiuh T,Schloss G A.Implementation and evaluation of a multimedia file system[C]//Proceedings of IEEE International Conference on Multimedia Computing and Systems, 1997,1:269-2761
  • 5Park S,Ohm S Y.New techniques for real-time FAT file system in mobile multimedia devices[J].IEEE Transactions on Consumer Electronics, 2006,52( 1 ) : 1-9.
  • 6Microsoft Corporation.FAT32 file system specification[S/OL].http:// www.microsofl.com/whdc/syst em/plafform/fi rmware/fatgen.msp.
  • 7Heasman J.Implementing and Detecting an ACPI BIOS Rootkit[EB/OL].(2006-03-11).https://www.blackhat.com/presen- tations/bh-federal-06/BH-Fed-06-Heasman.pdf.
  • 8Compaq,Phoenix,Intel.BIOS Boot Specification v1.01[EB/OL].(1996-05-13).http://www.phoenix.com/techs/specs.html.
  • 9Intel.Preboot Execution Environment Specification v2.1[EB/OL].(1999-07-26).http://download.intel.com/design/archives/wfm/down- loads/pxespec.pdf.
  • 10Christodorescu M,Jha S.Static Analysis of Executables to Detect Malicious Patterns[C]//Proc.of the 12th USENIX Security Symposium.Berkeley,USA: [s.n.],2003.

共引文献23

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部