适用于海军OFP集成开发(PARANOID)的强大认证机制:嵌入式航空电子软件不可规避代码签名和可追溯性的愿景

Q3 Decision Sciences
Joe Garcia, R. Shannon, Aaron Jacobson, William Mosca, Michael Burger, Roberto Maldonado
{"title":"适用于海军OFP集成开发(PARANOID)的强大认证机制:嵌入式航空电子软件不可规避代码签名和可追溯性的愿景","authors":"Joe Garcia, R. Shannon, Aaron Jacobson, William Mosca, Michael Burger, Roberto Maldonado","doi":"10.1108/jdal-03-2020-0006","DOIUrl":null,"url":null,"abstract":"\nPurpose\nThis paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.\n\n\nDesign/methodology/approach\nAn SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.\n\n\nFindings\nBlockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.\n\n\nPractical implications\nA blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.\n\n\nOriginality/value\nMany SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.\n","PeriodicalId":32838,"journal":{"name":"Journal of Defense Analytics and Logistics","volume":"66 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software\",\"authors\":\"Joe Garcia, R. Shannon, Aaron Jacobson, William Mosca, Michael Burger, Roberto Maldonado\",\"doi\":\"10.1108/jdal-03-2020-0006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nPurpose\\nThis paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.\\n\\n\\nDesign/methodology/approach\\nAn SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.\\n\\n\\nFindings\\nBlockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.\\n\\n\\nPractical implications\\nA blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.\\n\\n\\nOriginality/value\\nMany SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.\\n\",\"PeriodicalId\":32838,\"journal\":{\"name\":\"Journal of Defense Analytics and Logistics\",\"volume\":\"66 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Defense Analytics and Logistics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/jdal-03-2020-0006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Decision Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Defense Analytics and Logistics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/jdal-03-2020-0006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 0

摘要

本文旨在描述为支持海军航空企业(NAE)软件支持活动(SSA)中的DevSecOps提供健壮且安全的软件开发范例的努力,该范例支持有关SSA输出产品(称为作战飞行计划(OFP))的强大可追溯性和可证明性。通过安全开发环境(SDE),在开发过程中在OFP上执行的每个关键软件开发功能在区块链上都有相应的记录。设计/方法/方法SDE作为虚拟机或容器实现,其中包含经过修改以支持区块链交易的软件开发工具。每个关键的软件开发功能,例如编辑、编译、链接,都会生成一个区块链交易消息,其中包含嵌入在所述功能输出中的相关信息,这些信息可以一起用于证明完整性和支持可追溯性。认证过程用于提供证据,证明包含SDE的工具链在执行上述关键功能时不会受到未经授权的修改。区块链方法被证明是一种可行的方法,可以支持由NAE SSA为NAE嵌入式系统软件生产的关键任务软件的详尽可追溯性和开发系统完整性的强可证明性。可在OFP负载点实施的基于区块链的身份验证方法将为所有OFP软件组件提供细粒度身份验证,每个组件或模块在其整个开发历史中都有自己的完整性证明(包括使用的开发工具的完整性)。原创性/价值许多ssa已经建立了开发控制程序,例如结帐/签入。这并不能证明SSA输出软件是安全的。首先,构建系统不一定以一种可从输出确定的方式执行过程。此外,SSA工具链本身也可能受到攻击。本文中描述的方法强制执行安全策略,并将信息嵌入到每个开发功能的输出中,这些功能可以交叉引用区块链交易记录,以获得可验证性和可追溯性,只有可信的工具,没有未经授权的修改,才能在软件开发中使用。这种方法的一个关键原始概念是,它将分配给开发者的时间视为可转让的数字货币。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software
Purpose This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain. Design/methodology/approach An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed. Findings Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software. Practical implications A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history. Originality/value Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
0.90
自引率
0.00%
发文量
5
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信