簡易檢索 / 詳目顯示

研究生: 姜翰杰
Chiang, Han-Chieh
論文名稱: 數位電視平台之弱點強化與動態偵防機制
Hardened Vulnerability and Dynamic Monitoring for DVB-Multimedia Home Platform
指導教授: 侯廷偉
Hou, Ting-Wei
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 77
中文關鍵詞: 開放式服務平台互動式數位電視平台Java 安全性惡意攻擊
外文關鍵詞: Malicious attacks, Java Security, MHP, OSGi
相關次數: 點閱:63下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • MHP數位電視平台,以Java執行環境為基礎,讓服務(應用程式)得以動態的從無線電波或者網路上下載並直接安裝,提供了平台的可擴充性,使得服務更為多元化。但是在現有的Java安全機制下,仍有可能遭受惡意的程式攻擊。
    Parrend 及 Frenot提出的方法,除沿用既有的Java 使用權限(Permissions)之外,對OSGi平台又補強了8種可能發生在平台上的攻擊防護,使得平台保護比,由41%提昇至66%。但此法仍然具潛在的危險,主要的因素是無偵測的能力,尤其是當惡意的程式不在定義的列表中,或者是濫用合法資源的攻擊時,無法進一步察覺並採取適當的措施。此外我們實驗室研發的“OSGi動態偵防系統也加入了偵防的能力,使得就算平台受到攻擊也可以察覺,並進行移除或隔離的保護措施。我們認為,上述的兩種方法存在著互補的關係,當兩種方法同時存在時,能夠解決兩平台彼此的缺點。在我們的研究中發現,OSGi和MHP平台對於應用程式的管理非常類似,所以在OSGi上會發生的問題也有可能發生在MHP平台上,因此本研究將上述的兩種方法整合,並應用在MHP平台上。
    實驗結果顯示,雖然整合上述的兩種方法會比完全不使用任何方法的MHP平台慢99%到350%(執行期間只有慢12%到82%),但卻可以使得平台保護比由41% 提升至69%,另外,Parrend and Frenot的方法中,無法做到移除無窮迴圈的弱點,也可以獲得解決。

    Multimedia Home Platform (MHP) is an open platform for DVB. An MHP platform is based on a Java execution environment, whose characteristics provide the MHP platform more extendibility and diversification. However, current Java security still has some weak points.
    Parrend and Frenot proposed to use Java Permission to improve the security of OSGi platforms. Their approach improves the protection rate from 41% to 66%. Our lab also proposed another approach which not only uses the Java Permission, but also added a strategic decision to determine malicious attacks on OSGi platforms. Since OSGi and MHP have a similar model of application management, and there has not related approaches on how to harden MHP platforms, we porpose to integrate the previous two approaches to further harden MHP platforms.
    The experimental result shows that the hardened MHP platform degraded form 99% to 350% (the execution time increased only 12% to 82%). Moreover, the protection ratio is also raised from 41% to 69%. Besides, our approach is able to remove the infinite-loop weakness of Parrent and Fenot’s approach.

    中文摘要......................................................................................................................iii 英文摘要......................................................................................................................iv 目錄...............................................................................................................................v 圖目錄.........................................................................................................................vii 表目錄...........................................................................................................................x 1 緒論.........................................................................................................................1 2 背景與文獻探討.....................................................................................................3 2.1 JAVA SECURITY.............................................................................................3 2.2 MHP SECURITY............................................................................................13 2.3 MHP平台分析................................................................................................15 2.3.1 MHP基本架構簡介.................................................................................16 2.3.2 MHP結構分析.........................................................................................18 2.3.3 MHP模型分析.........................................................................................21 2.3.4 MHP安全性分析.....................................................................................23 2.4 弱點樣式清單與平台保護比........................................................................26 2.4.1 OSGi基本架構簡介.................................................................................26 2.4.2 弱點樣式清單.........................................................................................28 2.4.3 平台保護比.............................................................................................31 2.5 入侵偵測........................................................................................................32 2.5.1 異常偵測.................................................................................................33 2.5.2 濫用偵測.................................................................................................36 3 系統架構與設計...................................................................................................39 3.1 系統弱點強化................................................................................................39 3.2 動態偵防機制................................................................................................46 3.3 數位電視平台之弱點強化與動態偵防系統架構........................................50 4 實作與驗證 .........................................................................................................54 4.1 開發環境介紹................................................................................................54 4.2 弱點強化的實作............................................................................................54 4.3 動態偵防系統模組的實作 ..........................................................................57 4.4 平台保護比的比較........................................................................................66 4.5 效能量測........................................................................................................68 4.6 其它................................................................................................................71 5 結論與展望...........................................................................................................74 參考文獻.....................................................................................................................75

    [1] Digital Video Broadcasting (DVB); Multimedia Home Platform (MHP) Specification 1.1.1, ETSI TS 102 812 V1.2.1 (2003-06).
    [2] Helayne T. Ray, Raghunath Vemuri, Hariprasad R. Kantubhukta, “Toward an Automated Attack Model for Red Teams”, IEEE Security and Privacy, VOL.3, NO.4, July-Aug 2005.
    [3] James P. Anderson, “Computer Security Threat Monitoring and Surveillance”, Technical report, 1980.
    [4] Ovidiu DOBRE, “Java-Security Concepts”, Advanced System Seminar, Departement of Computer Science System Architecture Group, July 2003.
    [5] Sun Microsystems, “Java Security Architecture”, available from http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc1.html#21150
    [6] D. S.Wallach and E. W. Felten, “Understanding Java Stack Inspection”, in the Proceedings of Security and Privacy, May 1998.
    [7] Sun Microsystems, ”Default Policy Implementation and Policy File Syntax”, available from http://java.sun.com/j2se/1.4.2/docs/guide/security/PolicyFiles.html
    [8] Sun Microsystems, ”Permissions in the Java 2 SDK”, available from http://java.sun.com/j2se/1.4.2/docs/guide/security/permissions.html
    [9] Steven Morris and Anthony Smith-Chaigneau, Interactive TV Standards, Focal Press, 2005.
    [10] P. Parrend, S. Frenot, “Security benchmarks of OSGi platforms: Toward hardened OSGi”, Software: Practice and Experience, 2008, online available, http://www3.interscience.wiley.com/journal/121505042/abstract?CRETRY=1&SRETRY=0
    [11] The MHP Knowledge Project,”The MHP-Guide”, MHP-KDB, Technical report, 2006.
    [12] Steven Morris, “Interactive TV web”, 2004,available from http://www.interactivetvweb.org/index.shtml
    [13] L.Gong, Ellison, G. & Dadgeforde, M., Inside Java 2 Platform Security - Architecture API Design and Implementation, Addison-Wesley, Second Edition, 2003.
    [14] T.Aslam, A Taxonomy of Security Faults in the Unix Operating System, Master’s thesis, Purdue University, 1995.
    [15] P. Parrend, S. Frenot, “Java Components Vulnerabilities-An Experimental Classification Targeted at the OSGi Platform”, Research Report RR-6231, INRIA, June 2007.
    [16] 黃啟智, OSGi平台之動態偵防系統,碩士論文,國立成功大學工程科學系, 2007.
    [17] XleTView web forum, available from http://xletview.sourceforge.net/
    [18] Sun Microsystems, ”JAR Signing and Verification Tool”, available from http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/jarsigner.html
    [19] Sun Microsystems, ”Key and Certificate Management Tool”, available from http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html
    [20] Sun Microsystems, “Virtual Machine Profiler Interface (JVMPI)”, available from http://java.sun.com/j2se/1.4.2/docs/guide/jvmpi/jvmpi.html
    [21] OpenMHP web forum, available from http://www.openmhp.org/forum/
    [22] MHP official website, available from http://www.mhp.org/
    [23] John Corwin, David Bacon, David Grove, Chet Murthy, ”A Rational Module System for Java and its Applications”, Technical report, IBM Research, 2003.
    [24] P. Parrend, S. Frenot, “Supporting the secure Deployment of OSGi Bundles”, Technical Repport, INRIA, June 2007.
    [25] P. Parrend, S. Frenot, “Secure Component Deployment in the OSGi Release 4 Platform”, Technical Repport, INRIA, June 2006.
    [26] Junchun Luo, “Home network application security (MHP)”, Technical report, Department of Computer Science and Engineering, Helsinki University of Technology, 2002.
    [27] Sun Microsystems, ”Policy File Creation and Management Tool”, available from http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/policytool.html

    下載圖示 校內:2010-02-11公開
    校外:2010-02-11公開
    QR CODE