面向关键信息基础设施的软件准入许可与行为管控方法

Software Access Licensing and Behavior Control Method for Critical Information Infrastructure

  • 摘要: 针对关键信息基础设施中软件部署许可及其运行时行为监管缺失的问题,传统网络监管及访控机制因缺乏对软件的许可机制与代码段完整性的动态验证,难以防范恶意篡改和未授权运行等安全风险。因此,本文提出一种软件行为管控机制,能对获取资源数据所用软件运行时加载代码段的完整性监控,以保证软件在使用过程中遵守规范,防止软件运行时代码篡改、未经授权运行等恶意行为发生。进而从零信任架构模型出发,提出了一种基于软件存证的软件行为管控方案,该方案采用椭圆曲线上双线性映射的同态聚合盲认证方法,通过对软件中指定字节码进行标记、生成可验证密码凭证并存入所发放的软件部署许可中。在软件运行期间,实时抓取该软件运行时代码段中的字节码,采用密码学的盲验证方式,即在监管系统无需获取字节码的“原始软件不出域、软件可控可评估”前提下,完成与许可证中密码凭证的有效校验,解决在访问控制中关键信息基础设施上软件行为的有效管控问题。实验结果表明:该方案可有效检测内存中的恶意篡改行为、未授权执行等安全风险,为关键信息基础设施中软件行为的实时监管提供了一种可存证、可审计的安全解决方案。

     

    Abstract: The lack of software deployment licensing and runtime behavior regulation in critical information infrastructure leads to significant security risks. Traditional network monitoring and access control mechanisms are ineffective in preventing threats like malicious tampering and unauthorized execution, as they lack dynamic verification of software licensing and code segment integrity. To address this issue, this paper proposes a software behavior control mechanism that monitors the integrity of runtime-loaded code segments used by software to access resource data. This ensures that software adheres to regulations during use and prevents malicious actions, such as code tampering and unauthorized execution. Based on the concept of zero-trust architecture, the paper introduces a software behavior control scheme using software evidence preservation. This scheme shifts from traditional boundary protection to resource-centered protection. All computational services are treated as resources, and each resource must undergo security evaluation and continuous monitoring. Specifically, the scheme divides the current system into two parts: the data interface and the control interface. The control interface is responsible for making access decisions and includes software endorsement nodes, software certification nodes, and software monitoring nodes. The data interface receives the control interface's decisions and performs the corresponding operations. In the control interface, the software endorsement point (SEP) retrieves the software package uploaded by the resource host and pre-executes the program to simulate its operations. By marking specific bytecodes, generating software evidence, and storing it on IPFS, blind authentication and evidence preservation of the software are achieved. The software supervision point (SSP) receives user access requests and verifies the software’s integrity and legitimacy at runtime via the software authentication point (SAP). SAP uses a blind authentication algorithm to verify if the software has been tampered with or exhibits any anomalies. The daemon process (DP), acting as a prover, uses the software evidence stored in the blockchain to capture and verify runtime code segments, ensuring that software behavior complies with regulatory and licensing requirements. The proposed scheme uses a homomorphic aggregate blind authentication method based on bilinear mapping on elliptic curves. It marks specific bytecodes in the software, generates verifiable cryptographic credentials, and stores them in the software deployment license. During software execution, bytecode in the runtime code segments is captured in real time, and cryptographic blind verification is used to validate these credentials against those stored in the license. This approach resolves the software behavior control issue without needing access to the original bytecode, ensuring the security of critical information infrastructure. The results demonstrate that this scheme can effectively detect malicious tampering and unauthorized execution risks in memory. It provides a verifiable and auditable security solution for real-time monitoring of software behavior in critical information infrastructure.

     

/

返回文章
返回