ABSTRACT

Trusted computing is a new thought of computer security and becoming a new trend of computer security field. Trustiness of software dynamic behavior is always the research hotpot and difficult point in the field of trusted computing. Current static trusted authentication just guarantees integrity of data and critical files by checking hash value of binary codes and critical files before running. Dynamic trusted authentication of software is a difficult point of trusted computing research and depends on three key aspects, including the extraction and description of intended software behavior, real-time monitoring of software behavior, and a contrastive analysis of intended software behavior and running-time behavior. The theoretical research lags behind the technical practice and there is no generally acceptable theoretical method in the field of trusted computing. How to abstract and describe the behavior of software is the paramount task of dynamic authentication. The accuracy and simplicity of abstraction and description of the software behavior affect validity and practicability of the model.