| 注册
首页|期刊导航|工程科学学报|面向关键信息基础设施的软件准入许可与行为管控方法

面向关键信息基础设施的软件准入许可与行为管控方法

于汝云 姚启钧 朱岩 李星漫 刘国伟 武晓博

工程科学学报2025,Vol.47Issue(8):1672-1685,14.
工程科学学报2025,Vol.47Issue(8):1672-1685,14.DOI:10.13374/j.issn2095-9389.2025.04.12.001

面向关键信息基础设施的软件准入许可与行为管控方法

Software access licensing and behavior control method for critical information infrastructure

于汝云 1姚启钧 2朱岩 3李星漫 3刘国伟 4武晓博5

作者信息

  • 1. 中国电子科技集团公司第三十研究所,成都 610041
  • 2. 北京抖音信息服务有限公司,北京 100192
  • 3. 北京科技大学计算机与通信工程学院,北京 100083
  • 4. 北京市政务服务与数据管理局,北京 101117
  • 5. 交通运输部科学研究院,北京 100029
  • 折叠

摘要

Abstract

Critical information infrastructures(CIIs)serve as the vital cornerstone of a country's economic and social operation,and they constitute the crucial protection for national security and public benefits.Within CIIs,implementing strict software deployment licensing and runtime behavior regulation is essential to ensure the security and stability of systems while preventing malicious acts from within.Otherwise,the absence of such functions would lead to significant security risks.Traditional network monitoring and access control mechanisms are ineffective in preventing threats such as malicious tampering and unauthorized execution,as they lack dynamic verification of software licensing and code segment integrity.To address this issue,this study proposes a software behavior control mechanism that monitors the integrity of runtime-loaded code segments used by software to access resource data.This ensures that the software adheres to regulations during use and prevents malicious actions,such as code tampering and unauthorized execution.Based on the concept of zero-trust architecture,it introduces a software behavior control scheme using software evidence preservation,which shifts from traditional boundary protection to resource-centered protection.All computational services are treated as resources,and each resource must undergo security evaluation and continuous monitoring.Specifically,the scheme divides the current system into two parts:data interface and control interface.The control interface is responsible for making access decisions and includes software endorsement,software certification,and software monitoring nodes.The data interface receives the control interface's decisions and performs the corresponding operations.In the control interface,the software endorsement point retrieves the software package uploaded by the resource host and pre-executes the program to simulate its operations.By marking specific bytecodes,generating software evidence,and storing it on the inter planetary file system,blind authentication and evidence preservation of the software are achieved.The software supervision point receives user access requests and verifies the software's integrity and legitimacy at runtime via the software authentication point(SAP).The SAP uses a blind authentication algorithm to verify if the software has been tampered with or exhibits any anomalies.The daemon process,acting as a prover,uses the software evidence stored in the blockchain to capture and verify runtime code segments,ensuring that the software behavior complies with regulatory and licensing requirements.The proposed scheme uses a homomorphic aggregate blind authentication method based on bilinear mapping on elliptic curves.It marks specific bytecodes in the software,generates verifiable cryptographic credentials,and stores them in the software deployment license.During software execution,bytecode in the runtime code segments is captured in real time,and cryptographic blind verification is used to validate these credentials against those stored in the license.This approach resolves the software behavior control issue without requiring access to the original bytecode,ensuring the security of CII.The proposed software behavior control scheme has been deployed and operated on the Beijing Government Data Cloud Platform,completing security assessments,license issuance,and runtime behavior monitoring for more than 200 applications.The results demonstrate that this scheme can effectively detect malicious tampering and unauthorized execution risks in memory.It provides a verifiable and auditable security solution for the real-time monitoring of software behavior in CII.

关键词

软件行为管控/零信任架构/软件存证/双线性映射/同态聚合盲认证

Key words

software behavior control/zero-trust architecture/software evidence preservation/bilinear mapping/homomorphic aggregate blind authentication

分类

信息技术与安全科学

引用本文复制引用

于汝云,姚启钧,朱岩,李星漫,刘国伟,武晓博..面向关键信息基础设施的软件准入许可与行为管控方法[J].工程科学学报,2025,47(8):1672-1685,14.

基金项目

北京市自然科学基金资助项目(M23017) (M23017)

工程科学学报

OA北大核心

2095-9389

访问量0
|
下载量0
段落导航相关论文