• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analysis ofsystem trustworthiness based on information fl ow noninterference theory

    2015-12-23 10:09:11

    1.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Jiangsu Automation Research Institute,Lianyungang 222061,China

    Analysis ofsystem trustworthiness based on information fl ow noninterference theory

    Xiangying Kong1,2,*,YanhuiChen2,and YiZhuang1

    1.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Jiangsu Automation Research Institute,Lianyungang 222061,China

    The trustworthiness analysis and evaluation are the bases of the trust chain transfer.In this paper the formalmethod of trustworthiness analysis of a system based on the noninterference(NI)theory of the information fl ow is studied.Firstly,existing methods cannot analyze the impact of the system states on the trustworthiness ofsoftware during the process oftrustchain transfer.To solve this problem,the impact of the system state on trustworthiness ofsoftware is investigated,the run-time mutualinterference behaviorofsoftware entities is described and an interference modelofthe access controlautomaton ofa system is established. Secondly,based on the intransitive noninterference(INI)theory,a formalanalytic method of trustworthiness for trustchain transfer is proposed,providing a theoreticalbasis for the analysis ofdynamic trustworthiness ofsoftware during the trustchain transfer process. Thirdly,a prototype system with dynamic trustworthiness on a platform with dual core architecture is constructed and a veri fi cation algorithm of the system trustworthiness is provided.Finally,the monitor hypothesis is extended to the dynamic monitor hypothesis,a theorem of static judgment rule of system trustworthiness is provided,which is usefulto prove dynamic trustworthiness of a system at the beginning of system construction.Compared with previous work in this fi eld,this research proposes notonly a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practicalimplementation.

    trusted computing,trustchain,intransitive noninterference(INI),dynamic trustworthiness,access control.

    1.Introduction

    Trusted computing proposed by the trusted computing group(TCG)is regarded as an effective method forsolving the security problem of information systems,and the core idea is to use a hardware module called trusted platform module(TPM)which is independentof CPUcontrolas the source of trust.A chain of trustis established on the basis ofthe trusted TPM,which means thatallthe software must be veri fi ed to be trustable before running[1].Software is the soul of a modern computer system because the functionality of a modern computer system is implemented in the form of software programs.Trustworthiness of a computer system is based on trustworthiness of allits running software.

    The concept of trustworthiness of a software program originates from social science[2].Trust in society is defi ned as“a social behavior that prefers those who behave according to societal rules”[3].The trust relationship between two parties may vary with time and situations,so trust relationships between groups or people are dynamic [4,5].In[4],trust is characterized as a social relationship that is dynamically developed and spirally reinforced.In [6],trust is viewed as a quantity that gradually changes rather than a binary choice between trust and distrust.In fact,the trust relationship between people varies as time and situation change.For example,the trust relationship between group members varies according to the nature of their tasks and the progress of these tasks.Similar to that in social science,the trust relationship between software entities also possesses this dynamic nature.Trustworthiness of a software entity depends on both internal and externalcauses.The internalcauses are dynamic changes of the software entity itself,and the external causes are the dynamic environmentin which the software entity is executed,i.e.changes of the state of a computersystem.However,the impact of the system state on trustworthiness of software is largely overlooked in mostexisting researches.

    Currently,there are many research achievements in the measurementmodelofsoftware trustworthiness.Pateland Beth use the probabilistic approach to model and measure trustworthiness ofsoftware entities running in an open network environment,but their approach emphasizes the“trust and reputation”of a software entity[7,8].In orderto re fl ect the fuzzy nature of the trust relationship,Tang and Mo employ the fuzzy set theory to model and assess the management of trustworthiness of software entities in an open network environment[9-11].There are some other approaches to modelsoftware trustworthiness. In[12,13],trust models based on the process algebra and evidence theory were proposed,and in[14],a trustmodel based on software behaviorism was presented.All these models representthe authors’own understanding and definition of the concept of trust,but they do not re fl ect the nature of the run-time interaction between software entities.The TCG proposed a TPM-based binary attestation (TBA)[1].IBM proposed integrity measurementarchitecture(IMA)based on the TBA,which is capable of doing an integrity measurementbefore loading modules into the system[15],but the integrity of modules is only one of many trustworthiness-related properties of a software entity.In[16],the limitations of trustworthiness measurementbefore TCG loading was analyzed and a conclusion was made that load-time trustworthiness does not imply run-time trustworthiness,the integrity and trustworthiness are notequivalentand static trustworthinessdoes notimply run-time trustworthiness.

    To solve the problem of software run-time trustworthiness,some researchers take approaches based on the noninterference(NI)theory ofinformation fl ow.In[17],the NI theory of information fl ows into the fi eld of trusted computing.Their approach instantiates the abstract term entities in the TCG’s de fi nition oftrustworthiness in processes, maps processes to the security domain of the NI theory, establishes a trust chain transfer model based on the NI theory,and provides a formal description and validation of this model,but the forms of interference are not analyzed in their papers,and the trust chain transfer function needs further studies.Base on their work,in[18,19],an abstraction was made that a running system is composed of processes/modules,actions and state outputs.They employed the intransitive noninterference(INI)theory and reference monitor assumptions(RMA)to present a formal de fi nition,description and analysis of the conditions of a trusted running process/module.They also provided the judgment method of trust chain transfer of the trusted computing platform and proved it.A prototype of trusted computing using the virtualmachine separation technique was also constructed.

    There are two problems left[18,19]:(i)The prototype system is implemented using the virtual machine which uses a very coarse trustable unit.Trustworthiness within the virtualmachine itself and how the trustchain transfers are not discussed.(ii)Any details about the implementation of the trustable communication channelare notgiven. The software dynamic trustworthiness based on process algebra is modelled,and a method of analyzing software dynamic trustworthiness is proposed[20].The method is applied to analyze the interference relationship between information fl ow within a single process and information fl ow among multiple processes based on the INI theory. These results provide a novel idea for using the INI theory to analyze the software trustworthiness during loadtime and run-time.However,researches mentioned above do nottake into accountthe impactof system state on software dynamic trustworthiness,and system trustworthiness is notstudied either.

    NI of information fl ow was proposed fi rst by Goguen and Meseguer[21],which is a method for analyzing system security from the perspective of information fl ow.After that,Rushby improved it by proposing the INI model of information fl ow[22].The core idea of the INI model is thatfor a particular access operation,if the system state after a sequence of access actions are executed is identical to the state after all actions that do not interfere with a particular domain are removed from the sequence of actions with the ipurge function,then the access operation is considered to be secure,otherwise,there must be a potential access operation that could interfere with the execution of the access operation,which results in an unsafe operation.The INI model divides the system entity into several different security domains according to the prede fi ned security levels.If actions of a security domain u have no effect on the outputs of another security domain v,then it can be considered that domain u does not interfere with domain v.The interference rules of an INImodel are considered to be static,so the INI theory cannot describe changes ofthe interference relationship among software entities caused by changes of the system states and the INI theory cannot help to analyze the impact of the system state on the transfer of the trustchain.

    To re fl ect the impact of the system state on interference rules,Leslie proposed a dynamic intransitive noninterference(DINI)model[23],which uses the automaton to modela system.An action willcause the state transition of the system,and generate some outputs.To re fl ect the dynamic characters of security rules of the system which changes with time,the DINI model associates rules with the state.That is to say,the system state is a dependent variable of the interference relationship.In different system states,the interference relationship between domain u and domain v is also different,so DINIis able to describe the interference relationship among security domains in differentsystem states.

    In this paper,the impactofthe system state on trustworthiness of software is analyzed,the access control tech-nique is employed to model the run-time states of software,a formalanalysis method to evaluate trustworthiness of the software entity in the process of trust chain transfer and the de fi nition of trustworthiness of trust chain transfer are proposed and a judgment rule of the system dynamic trustworthiness is provided.The main innovations are:(i)we discuss the impact of system state on software trustworthiness and establish an automaton model of the dynamic systems;(ii)we propose a formal analysis method for analyzing trustworthiness of software entities and systems,and give a judgment theorem;(iii)we extend the RMA to the dynamic reference monitor assumptions(DRMA)and give a judgmenttheorem of trustworthiness of a system.

    The rest of this paper is organized as follows.In Section 2,the access control technique is used to model the run-time state of software systems.Section 3 fi rst introduces the DINI model based on which a formal analytic model of run-time software trustworthiness is provided and a DINI-based system dynamic judgment theorem is proved.Section 4 uses examples to illustrate the process of analyzing the software dynamic trustworthiness with the DINI model,and presents a prototype system with dynamic trustworthiness.Section 5 is a conclusion of this paper with a summary of all work in the previous sections and gives a future research plan.

    2.Modeling of the dynamic behavior of

    a system

    In a modern computersystem,a software program is stored in a data storage device in the form of a binary executable image before it is loaded into the system.To run the software program,the operating system(OS)will load the binary image into memory,allocate all necessary resources, create a corresponding process and start it,so a process is the form of a run-time software program.At the program loading stage,trust chain transfer is carried out with the software module as the basic unit of a transfer,so at this stage the software entity is composed of all the independently loadable modules.At the run-time stage when all the processes are scheduled to run by the OS scheduler, transfer of the system trust chain is carried out with the process as the basic unit of a transfer,so at this stage the process is the object of this study of dynamic trustworthiness of systems.

    2.1 Impact of the system state on trustworthiness of processes

    In[17-19],the assumption is made thatthe basic entity of trusted computing is the process.In[19],a trusted computing environment using the virtualization technology is constructed.The entity of the trustchain transfer is called a component,which is also a process from the perspective ofthe hypervisor.Allthese researches are based on the INI model,which assume that interferences among processes are invariant,and do not take into account the impacts of the system state on software trustworthiness.

    In a practical system,trustworthiness of a software entity is closely related to the system state in which itis running.Consider the following two cases.

    Case 1Assume there are two users Hu and Li in a system and they belong to two differentsecurity levels(security domains).Normally information is only allowed to fl ow from Li to Hu rather than the reverse direction ofinformation fl ow,but under some particular conditions,the system will temporarily upgrade the security level of Li, and allow information fl ow from Hu to Li.For example, Li obtains a temporary secret key,and is allowed to have access to a fi le thatbelongs to Hu.

    Case 2The INI system constructed with the virtual machine in[19]is shown in Fig.1.The arrows represent the direction of information fl ow,i.e.the interference relationship.Due to the characteristics of software,updates are unavoidable.Assume virtualmachine A with a high security level needs to be updated,and then the system has to do this via the update module of the HyperVisor.A new domain A'is introduced to minimize impacts ofthe updating process on the running system A.In the HyperVisor, another new domain H should be introduced,which creates the domain A',and copies information of A to A'. The interference rule is A~>H,H~>A'(A~>H means domain A is allowed to interfere with domain H, i.e.information is allowed to fl ow from domain A to domain H).When domain H is copying information to confi gure domain A',domain A can still be communicating with virtualmachine C via a trusted channel B,as shown in Fig 2.Once A'is properly con fi gured,A'willreplace A to communicate with C via the trusted channel B and the system rule now is changed to A/~>H(A/~>H means domain A cannot interfere with domain H,i.e.information fl ow from domain A to domain H is notallowed),but domain H stillkeeps high levelsecurity information itobtains while itis con fi guring domain A',as shown in Fig.3. Since the system needs domain H to update domain C,a new domain C'has to be created,which introduces rules C~>H and H~>C',and then an insecure channelis formed which allows information with a high security level to fl ow to domains with a low security level,as shown in Fig.4.As a result,as the system state changes,trustworthiness of modules which are used to update the virtual ma-chine in domain H also changes.

    From the cases above,it can be seen that the interference relationship among processes changes with the system state,and trustworthiness of software at a particular time and in a particular system environmentdoes not imply its trustworthiness when it is scheduled to run for the second time in a differentsystem environment.

    Fig.1 Trusted computing system constructed in[19]based on virtualmachine

    Fig.2 An illustration of the process ofupdating domain A

    Fig.3 Process after the upgrade

    Fig.4 An illustration of the process ofupdating domain C

    2.2 Definition of trustworthiness of a software entityTrustworthiness of a software entity RAincludes notonly module-integrity trustworthiness,but also run-time dynamic trustworthiness.To make it simple,in this paper it is assumed that each software entity has only one corresponding process in the system.The following is the formalde fi nition of trustworthiness of a software entity.

    Definition 1Trustworthiness ofsoftware entity RAcan be formally described as

    where MAdenotes the binary module before RAis loaded into the system memory.Load Trusted(MA)means MAis trusted atthe module loading stage,PAdenotes the runtime process of RA,and Run Trusted(PA)means PAis trusted during the run-time.

    The TCG speci fi cation gives a measurementmethod for integrity trustworthiness[1].In this paper,trustworthiness of run-time processes is discussed.

    In most computer systems,an independently loadable software module MAis an object fi le such as a binary executable or a dynamic loadable library stored on a storage device like a disk.Such a software module can be loaded into the system memory through a system loading function (data exchange between the primary memory and the sec-ondary memory could happen when processes are rescheduled and memory pages are swapped in and out),and will possess codes and data thatare used to perform a particular functionality,which is the same for OS kernels.These software modules possess the independenttext(code)segmentand data segment,and existin the form ofone process or a group of processes during the run-time.Each process possesses a group of registers,stacks/heaps and other necessary software and hardware recourses,such as CPU,I/O ports,fi le/device descriptors(handles).

    According to the de fi nition of a trusted software entity by the TCG,in a trusted system,an entity is considered to be trusted if it behaves as the system expects.In other words,it does not violate the prede fi ned conventions of the system and has no adverse effect on other entities in the same system.In computer systems,during the trust chain transfer process,a software entity is loaded into the system memory,and is allowed to use system resources such as CPU and I/O devices,which implies that the direct control of registers,memory and I/O is handed over to the software entity.This type of state changes in a computer system could become the basis for a vicious process to attack the system and cause critical information leakage.To be speci fi c,the main ways a malicious process can take to adversely affect other entities are:(i)violating CPU usage conventions,and occupying the CPU completely;(ii)using the system memory illegally,obtaining information unauthorized for the malicious software entity and viciously altering the contents in the memory of storage devices;(iii)illegally accessing fi les and devices.CPU usage is determined by the OS kernel,so this kind ofattack can be avoided with the improvementof the security of the OS kernel.Attacks through(ii)and(iii)essentially take advantage of the information fl ow in the system.When a process has the CPUtime,itwillexecute a series ofactions to obtain or revise the permissions,operations or information of other software entities.These actions and outputs willviolate the prede fi ned rules of the system,and have an adverse effect on other entities.From this point of view, software attacks and information leakage can be viewed as an unexpected information fl ow in the system,which can be analyzed with the NItheory of information fl ow.

    Software and hardware resources such as system memories,fi les and devices can be viewed abstractly as independently accessible(observable and changeable)objects. Each objectis given a name and an associated value.The name of each object is fi xed,but the corresponding value changes with the system state.The rule of access to an object of a process in the system is determined by a prede fi ned access control function.The access control function determines whether a given process has the right to observe(read)or change(write)a given object’s value in a particular state.A process in the system is composed of a sequence of actions.Each action accesses the setof names according to the access controlrules,and generates some outputs.Operation of the system is driven by actions,and execution of each action will drive the system into a new state.The system state is determined by allthe name-value pairs in the system.The following is the de fi nition of the dynamic behaviormodelof computersystems.

    Definition 2A computer system M is an octuple{N, V,A,S,s0,O,D,F}.

    N is the setofnames,representing the setofallthe alterable resources in the system,such as memory space,variables,fi les,I/O ports etc.Italic letter m is used to represent names in the set.

    V is the setof values,which is allthe possible values of allthe names.Greek letterνrepresents the values.

    A is the setofactions.Each action can be viewed as“input”,“command”or“instruction”thatthe automaton executes,and italic letter a and b are used to denote actions. Greek lettersαandβdenote a sequence ofactions.

    S is the setof states,which is denoted using italic letters s or t.

    s0is the initialstate,s0∈S.

    O is the setof outputs,which is de fi ned as allthe values corresponding to the names in N in states S.

    D is the setofprocesses.Each process has a corresponding security domain,and itis a one-to-one correspondence between a domain and a process.The rest of this paper makes no distinction between the security domain and its corresponding process.u and v are used to denote the security domain(process).Each process sends outoperational instructions to the system to interactwith otherparts ofthe system,and the corresponding results can be observed.

    F is the set of functions,which includes the following six functions:

    contents:S×N→V,contents(s,m)is the value corresponding to the name m in the state s.

    observer:D×S→P(N),where P(N)is the power setof the setof names,observer(u,s)is the set of names whose values can be observed by process u in the state s.

    alter:D×S→P(N),alter(u,s)is the setof names whose values can be altered by process u in the state s.

    dom:A→D,a mapping from an action to a process. dom(a)denotes the associated process of action a.

    step:S×A→S,the single-step state transferfunction step(s,a)=t means when an action a takes place in the state s,the system willtransfer from state s to state t.

    output:S×A→O,the outputfunction output(s,a) is the returned resultof an action a in the state s.

    The fi rst three functions determine the access matrix, which can be used to dynamically describe the access controlrules ofthe system.Notice thatthe state is a dependent variable of the access matrix.

    The lastthree functions are used in the DINImodel.

    Definition 3In system M and state s,running a process u is composed of executing a sequence of actionsthatbelong to this process,where 0≤i≤n,The system goes through a sequence of state transfersis called the state trace of process u produced when u begins to run in state s,which is denoted byis called the action trace, which is denoted by

    Since programsmightjump to severaldifferentbranches according to differentconditions,so in differentstates,the externalinput mightbe different,and the action sequence executed by the process is also different,resulting in differenttraces.

    To make it simple,it is assumed that the length of the action trace I is the set of non-negative integers,n∈I,i∈I and 0≤i<n.

    The functions head,tail and one are de fi ned as

    A?denotes the setof action sequences.

    The functions head,tail and one can be used respectively to obtain the pre fi x,suf fi x of the given length and the action of the given position in an action trace.

    3.Trustworthiness modeling ofa process based on DINI theory

    In[19],the DINImodelproposed by Leslie inherits many basic thoughts of Rushby,and it views a computer system as an automaton.An action will cause the transition of the system state,and generate some outputs.The main improvementof the DINI model includes the revised de fi nitions of the sources function,the ipurge function and local interference.

    Functions run,do and test de fi ned in[18]are applied to the computer system modelde fi ned above in this paper.

    For a system M,the system running function S× A?→S is an extension of the function step.

    Λdenotes the empty sequence,?denotes concatenation and a?αmeans a is the action before the action sequence α.

    Functions do and test are de fi ned as follows:

    To re fl ect the dynamics of rules,the system state is introduced into the interference relationship.

    It denotes the interference relationship among security domains in state s.us~>v means domain u interferences with domain v in state s,i.e.in state s,information is allowed to fl ow from u to v,and v is able to observe the result of the execution of actions of the process u.s~>means there is no interference relationship.

    Similarly,the system state into sources and ipurge functions is introduced as a parameterto re fl ectsystem dynamics.

    In order to differentiate the function sources from ipurge in the INI model and re fl ect the dynamic nature of the system model,these two functions are renamed as dsources and dipurge respectively in this paper.

    Definition 4Function dsources:A?×D×S→P(D) where P(D)is the power setof D.

    For a non-empty action sequence a?αs executed in a given state s,dsources checks whether a can directly interfere with a domain in dsources(αs,u,step(s,a))under the rules of state s.

    Defintion 5Function dipurge:A?×D×S→A?is de fi ned as

    In short,the result of performing the function dipurge(α,u,s)is to remove those actions in the sequence αwhich have no inference effect on u,and leave actions in the sequence thatdirectly orindirectly interfere with domain u.

    Definition 6The dynamic security property of a system.A system with dynamic rules is secure if an arbitrary action sequenceαand action a satisfy

    The security property of the system dynamic rules can be explained as follows:the system starts from the initial state s0,executes a series of actionsα∈A?,and produces a series of state transitions.Each state transition generates some outputs,and the system fi nally reaches the state s=do(α).In this state,action a of domain u(where u=dom(a))is executed,an output test(α,a)is generated.Actions a and its output u are used in a test to obtain some information about action sequenceα.If u is able to differentiate action sequenceαfrom dipurge(α,u,do(α)) by their different outputs through this test,then in state do(α),some domains v(vs~>u)which are supposed to have no interference relationship with domain u contain actions that interfere with u,which contradicts with the prede fi ned rule vs~>u,so the conclusion is thatthis system is insecure.

    In system M,processes are mapped to security domains and the trustchain transfer of the system(module loading and process scheduling)is equivalentto performing corresponding actions belonging to differentsecurity domains, so a given trustchain transfer process can be viewed as the execution procedure of the corresponding action sequence. If the interference relationship between the mapped domains satis fi es the conditions of DINI,then the information fl ow between processes willobey the prede fi ned security rules and violations of security rules will not happen. Thatmeans scheduling and execution of the processes are performed according to the prede fi ned ways and rules with no illegal mutualinterference,and then the corresponding loading procedure is trustable.

    The following is the de fi nition oftrustworthiness ofprocess execution in state s.

    Definition 7A system M performs a sequence of actionsα∈A?,and reaches state s=run(s0,α).u∈D is

    are the action trace and the state trace of process u in state s,respectively.allsatis fi es(14),then itcan be said thatprocess u is trusted in state s.

    Next is the de fi nition of trusted transfer of the system trustchain.

    Definition 8The initial state of system M is s0.s0is the root of the trust chain.Processes u0,u1,...,un∈D are sequentially scheduled and executed in the system. State siis the system state at the beginning of the execution of process ui.If on the scheduling list of the OS scheduler,the execution of each process uiis trusted in its corresponding state si,then the trust chain transfer is trusted.

    4.Decision theorem of system dynamic trustworthiness based on DINI

    The process dynamic trustworthiness modeland its analysis method have been provided and the decision theorem of computer system dynamic trustworthiness,which can decide trustworthiness ofthe designed system,willbe proposed in the following part.

    In order to give the decision theorem of system dynamic trustworthiness,de fi nitions of output consistency,weak single step consistency and dynamic partialinterference of the computersystem M are given as follows.

    Definition 9View partition and outputconsistency.The system M is view partitioned.If every process u∈D has an equivalentrelationshipu~on S,and those equivalentrelationships are consistent,then itshallmeet(15).

    Outputconsistency means if the two states s and t in the system are the same for process u,then in these two states, the execution of process u and the outputresult generated by the system are also the same.

    Definition 10Weak single step consistency.M is weak single step consistentif itmeets(16).

    Weak single step consistency means for processes u and v,if the two states s and t in the system are different,then in these two states,the execution of one process is transparentto the other,i.e.they cannotnotice the execution of each other.

    Definition 11Dynamic partial interference.For one rule,if M is a view-partitioned outputconsistency system, then itcan be said that M is dynamic partialinterfered,if itmeets(17).

    Namely,if the process v does notinterfere with the process u in the state s,then the activity effectof v in the states cannotbe noticed by u.From the perspective of state s,u cannotdifferentiate the result of state s before it executes action a from the resultof state s after itexecutes action a in process v.

    Definition 12Regulation interference.A system meets regulation interference.If the two states are equivalent from the perspective of process u,then under the regulations of state s and t,the aggregates of the process thatinterfere the process u are also the same.Then,(18)is valid.

    Theorem 1Expansion theorem ofdynamic regulation. M is a view-partitioned dynamic regulation system.If it meets allthe following conditions:

    (i)outputconsistency;

    (ii)weak single step consistency;

    (iii)dynamic partialinterference;

    (iv)regulation interference,

    then M is safe relative to the dynamic regulation,which means(12)is valid.

    In order to apply the expansion theorem of the dynamic regulation to the model system just established,it is necessary to introduce the DRMA,which is different from Rushby’s RMA.It introduces dynamic characters that refl ectthe operation of the system.

    First,the de fi nition of equivalentrelationshipof state aggregation S is given.

    Definition 13Equivalentrelationshipof state aggregation S.and meets(19).

    In state s,if acts of the system match the explanation of functions observer(u,s)and alter(u,s),the corresponding query control regulation can be executed and is regarded as safe.It needs to meet the following three assumptions.

    Definition 14Dynamic reference monitorassumptions.

    Assumption 1In orderto make the outputofact a only rely on the value observed by domain dom(a),(20)needs to be valid.

    Assumption 2If act a transforms the system from one state to another,allnew values thatchange the objectmust only rely on the value thatcan be observed and inquired by dom(a),namely itshould meet(21).

    Assumption 3In state s,if act a changes the value of object m,then dom(a)should be able to alter and access m.

    In the above DRMA,the difference between DRMA and RMAis thatAssumption 1 and Assumption 3 introduce the state restriction.This improvementdirectly re fl ects the information fl ow interference relationship between the system state change and the software entity,which means the trustworthiness restriction.

    The following is the dynamic trustworthiness judgment theorem based on the DINIsystem.

    Theorem 2System dynamic trustworthiness judgment theorem.If a system meets the requirementof DRMA and (23),then the system is trustworthy.

    Proofthe system should meetfour requirements ofthe dynamic regulation expansion theorem(Theorem 1).

    (i)Requirement1:outputconsistency.

    Make the view-partitioned relationshipof the dynamic intransitive expansion theorem equivalentto the corresponding relationshipof the DRMA.Assumption 1 of DRMA willdirectly getthe outputconsistency.

    (ii)Requirement2:weak single step consistency.

    In order to prove the weak single step consistency,it’s necessary to prove

    The above formula can be rewritten as

    Itcan be divided into the following three cases:Case 1

    Assumption 2 of DRMA can directly getthe conclusion based on sCase 2Case 3

    (iii)Requirement3:dynamic partialinterference. Prove

    Through the proof by contradiction,the de fi nition ofcan be extended,namely

    If contents(step(s,a),m)/=contents(s,m),through Assumption 3 of DRMA,it can be seen that m∈alter(dom(a),s)and thenu can be extrapolated through the conditions given by the theorem.

    (iv)Requirement 4:regulation interference,namely to attest

    In consideration ofthe orderliness of s and t,itis necessary to prove only

    And then,the theorem is proved.

    5.Example analysis and realization of prototype system

    5.1 Example analysis

    For case 1 mentioned above,the system is modeled as follows:

    Security policies:

    Namely,in state(h,l),the system allows information to fl ow from Hu to Li.

    step and output functions:

    For system actseries

    The initial state of the system is s0=(h,l).Pay attention thatthe initialstate can be any trustworthy state of the system.According to De fi nition 8,check whether the transmission of the system trustworthiness chain is trustworthy or not.

    (i)From initial state s0=(h,l),the system executesα sequentially.System states are

    (ii)Fortwo safe domains,calculate dipurge(α,L,(h,l)), and dipurge(α,H,(h,l)).

    For safe domain L

    Because dom(Li,f lip)=L,and dsource((Li,flip),

    Because dom(Hu,f lip)=H,and dsources(α,L, (h,l))={L}and H/∈{L},

    Namely,

    For safe domain H,

    Because dom((Li,f lip))=L∈dsources((Li,f lip),

    Because dom((Hu,f lip))=H∈dsources(α,H, (h,l))={L,H},

    Namely,dipurge(α,H,(h,l))=α.

    (iii)

    Therefore,according to De fi nition 8,for the given safe rule,the transmission of this trustworthiness chain is untrustworthy,because the act(Hu,f lip)in the safe domain H interferes with the safe domain L.

    For Case 2,the modelis: State aggregate:

    φmeans empty,sAand sCmean A and C have not been updated respectively,and sA,sCmean A and C have been updated respectively.Forsimplifying the process,the updating here is regarded as an atom act which is completed instantly.Communication between A and C willnot change the state.

    Act aggregate:A={aA,aC},which means both virtual machines A and C are updated.To make it simple, communication between A and C is notconsidered.

    Safe domain:D={uH,uA,uC}.

    To make it simple,the domain in which the trustworthy channelis located is notconsidered.

    Output aggregate:O={φ,{oA},{oC},{oA,oC}} means the information left in HyperVisor by the updating act.

    This means thatwhen the virtualmachine A is updated, the system does notallow the information to fl ow from uHto uC.

    Functions step and output:

    For system actseriesα=aAaC,the initialstate of the system is s0=φ.Note that the initial state can be any trustworthy state in the system.Through analysis,it can be found thatthe process is similar to circumstance 1.According to De fi nition 8,it can be judged that the system has information leakage.Therefore,the transmission ofthe trustworthiness chain corresponding to the act is untrustworthy.

    5.2 Realization of the prototype system

    This paper has provided an analysis method for processing dynamic trustworthiness.According to this method,a prototype system that supports the certi fi cation of system dynamic trustworthiness is designed and realized.

    The prototype system adopts bi-kernel trustworthy architecture(bi-kernelTRA).Itis composed ofthe superkernel and the user kernel.The super kernel is an unchangeable part.Itcan access alldata in the user-kernelwhich is regarded as a process operation.In orderto supportthe certi fi cation of system dynamic trustworthiness,the bi-kernel TRA is improved and the improved prototype is called the dynamic trustworthiness system based on bi-kernel(DT-biK).The structure is shown in Fig.5.

    Fig.5 Dynamic trustworthiness system based on bi-kernel

    The lowest level of the DT-biK is the hardware level including TPM.The upper one of it is the super-kernel level,and the topmostlevelis the application system level user-kernel.There is a TruMonitor module embedded in the user-kernel.Itcan monitor and interceptthe operations of all the application programs.The super-kernel level includes a security policies database of application systems and other data structures thatneed to be maintained. The user-kernelcan access virtual TPM(vTPM)provided by the super-kernel level through the virtual TPM driver (vTPM Drv)and the vTPM of the super-kernel level can access the real TPMthrough vTPMDrv.

    To make it simple,in the prototype system,the focus is only on acts that are related to the process and documentaccess,concentrating on Case 1.The system needs tomaintain the following three data structures.

    SPDB:A security policy database used to describe the dynamic interference relationship among processes;

    SSD:Asystem state descriptorused to record the current state of the system;

    SAS:A system actsequence used to record executed act series of the system.

    According to De fi nition 1,the trustworthiness certi fication algorithm of Trusted(RA)of the software entity RAcan be divided into two phases.The fi rst phase is to test Load Trusted(MA)and the second phase is to test Run T rusted(PA).

    During the loading process of software entity,measures and tests the completeness of MAby adopting the method given by reference [11],so as to ensure static trustworthiness of RA.testopportunity happenswhen the currentdocumentexecutes the fi les.The TruMonitorintercepts the system’s scheduling and tests the trustworthiness of the wait-to-be scheduling process curProc.The testalgorithm is as follows.

    Step 1Record the act of curProc as Act.P is the current system process line and p is the head of P.Make the currentprocess in a trustworthy state.

    Step 2Calculate O1:=test(SAS,Act).

    Step 3If p is empty,leap to Step 8.

    Step 4Calculate dipurge(SAS,P,SSD).

    Step 5Calculate O2:=test(dipurge(SAS,P,SSD), Act).

    Step 6If O1<>O2,make the process in an untrustworthy state and leap to Step 8.

    Step 7p:=p->next,leap to Step 3.

    Step 8If the process is in a trustworthy state,then SAS:=SAS?Act,modify SSD:=step(SSD,Act).

    Step 9Return to the state of the process.

    With the realization thought of RTLinux[24,25],the DT-biK on Loongson 2F is designed and realized.As Fig.6 shows,the super-kernel is modi fi ed by adopting GDB-STUB.Itis a super kernel.The user-kernelis modi fi ed on Linux core 2.6.18.Since the super-kernelis modi fi ed by GDB-STUB,it can be independent of the userkernel code that is modi fi ed based on the standard Linux core.They can be independently stored physically and trustworthiness of the module increases.

    Fig.6 Realization structure of DT-biK based on Loongson 2F platform

    For the interruption management,the super-kerneluses the hardware interruption of Loongson IP2-IP7 and isolates the user-kernel from the interruption controller through softinterruption.This is realized by replacing the interruption switch function(cli and sti),interruption return functioninterruption processing function and interruption vector table of Linux.Interruption processing of the user-kernel is replaced by soft interruption,which means using a group of variables to record the interruption switch and happening conditions.However,all hardware interruptions are intercepted by the super-kernel and whether it is necessary to conductinterruption groups to the user-kernel is decided by the interruption type and mark.

    On task scheduling,the super-kernel rede fi nes the scheduling function.The user-kernelis regarded as the low priority of the super-kernel,while the normaluser process can stilloperate on the user-kerneland use allkinds of services provided by the user-kernel.

    As the“real process”running in the super-kernel,the communication between the measurementmodule and the user-kernelstill adopts the Mbuff communication mechanism of RTLinux.

    In the prototype system of DT-biK,a simulation testfor Case 1 is conducted.The simulation result shows that Algorithm 1 can identify dynamic trustworthiness of the currentprocess operation.

    6.Conclusions

    Focusing on the analysis of software trustworthiness during the transmission of the trustworthiness chain,the paper analyzes the impact of the system state on process trustworthiness.It adopts access control to establish the software operation state mutual interference act model.Theaccess controlmatrix of the mutual interference act of the trustworthy entity caused by the memory,fi le/equipment handle can be directly transformed to codes so as to provide software analysis tools for system dynamic trustworthiness.It can be further used for collection/analysis of software operation state acts.Based on the DINI theory, the paper puts forward a system dynamic trustworthy form judgment theorem,which provides theoretic support for trustworthiness calculation.In addition,suf fi cient conditions of the judgment theorem in this paper are too strict for the entity trustworthiness judgment,and[26]gives a suf fi cient requisite condition which is used to check whether a system meets the INI model and provides the corresponding algorithm.The algorithm is divided into two phases.First of all,introduce an iP-observability attribute into the INI system and prove that the system will meet the INI only when it is regarded as iP-observability.And then,through the automaton transformation,a relationship between iP-observability and P-observability is tested.IP-observability is transformed to P-observability in the automaton so as to check whether the corresponding system meets INI[26]through the judgement of P-observability in the automaton.This provides a thoughtand basis about how to check whethera system meets DINI.The following plan of the research is to study the transformation method between DINIand the automaton and provide the requisite condition and the corresponding algorithm with which the system will meet the dynamic trustworthiness judgment theorem.

    [1]TCG Group.TCG speci fi cation architecture overview.TCG Speci fi cation Revision.http://www.trustedcomputinggroup.org.

    [2]H.G.Zhang,J.Luo,G.Jing,et al.Trusted computing research.Wuhan University:Natural Science Edition,2006, 52(5):513-518.(in Chinese)

    [3]C.S.Dong.A sociological study of credibility and its typology.Journal of Hebei Normal University(Philosophy and Social Science),2004,27(1):40-43.(in Chinese)

    [4]D.E.Zand.Trust and managerial problem solving.Administrative Science Quarterly,1972,17(2):229-239.

    [5]H.H.Brower,F.D.Schoorman,H.Tan.A model of relational leadership:the integration of trust and leader-member exchange.Leadership Quarterly,2000,(11):227-250.

    [6]R.C.Mayer,F.D.Schoorman,J.H.Davis.An integrative model of organizational trust.Academy of Management Review,1995,20(3):709-734.

    [7]T.Beth,M.Borcherding,B.Klein.Valuation of thustin open network.Proc.of the European Symposium on Research in Computer Security,1994:3-18.

    [8]J.Patel,T.W.T.Luke,N.R.Jennings,etal.A probabilistic trust model for handling inaccurate reputation sources.Proc. of the Third International Conference on Trust Management, 2005:193-209.

    [9]W.Tang,Z.Chen.Research of subjective trust management model based on the fuzzy set theory.Journal of Software, 2003,14(9):1401-1408.(in Chinese)

    [10]W.Tang,J.B.Hu,Z.Chen.Research on a fuzzy logic-based subjective trust management model.Journal of Computer Research and Development,2005,42(10):1654-1659.(in Chinese)

    [11]J.Q.Mo,Z.W.Hu,X.L.Ye.Research of trust assessment method in trust computing based on fuzzy theory.Journal of Computer Application,2013,33(1):142-145.(in Chinese)

    [12]X.X.Wang,X.Y.Kong,X.B.Chen.A dynamic noninterference trust chain model based on security process algebra.TELKOMNIKA Indonesian Journal of Electrical Engineering,2014,12(1):747-752.

    [13]L.L.Yuan,G.S.Zeng,W.Wang.Trust evaluation model based on dempster-shafer evidence theory.Journal of Wuhan University(Natural Science Edition),2006,52(5):627-630. (in Chinese)

    [14]Y.W.Qu.Software Behavior.Beijing:Electronic Industry Press,2004.(in Chinese)

    [15]R.Sailer,X.Zhang,T.Jaeger,et al.Design and implementation of a TCG-based integrigty measurement architecture. Proc.of the 13th USENIX Security Symposium,2004:223-238.

    [16]T.Jaeger,R.Sailer,U.Shankar.PRIMA:Policy reduced integrity measurementarchitecture.Proc.of the 11th ACM Symposium on Access Control Models and Technologies(SACMAT2006),2006:134-143.

    [17]J.Zhao,C.X.Shen,J.Q.Liu,etal.A noninterference-based trusted chain model.Journal of Computer Research and Development,2008,45(6):974-980.(in Chinese)

    [18]X.Zhang,Y.L.Chen,C.X.Shen.Non-interference trusted modelbased on processes.Journal on Communications,2009, 30(3):6-11.(in Chinese)

    [19]X.Zhang,Q.Huang,C.X.Shen.A formal method based on noninterference foranalyzing trustchain of trusted computing platform.Chinese Journal of Computers,2010,33(1):74-81. (in Chinese)

    [20]F.Zhang,M.Jiang,H.G.Wu,et al.Approach for trust analysis of software dynamic behavior based on noninterference. Computer Science,2012,39(1):101-103.(in Chinese)

    [21]J.Goguen and J.Meseguer.Security policies and security models.Proc.of IEEE Symposium on Security and Privacy, 1982:11-20.

    [22]J.Rushby.Noninterference,transitivity,and channel-control security policies.Menlo Park Stanford Research Institute, 1992.

    [23]L.Rebekah.Dynamic intransitive noninterference.Proc.of the IEEE International Symposium on Secure Software Engineering,2006,65-74.

    [24]X.Y.Kong,X.B.Chen,Y.Zhuang.A dynamic trustworthiness attestation method based on dualkernelarchitecture.InternationalJournalofHybrid Information Technology,2013,16(5): 237-248.

    [25]C.E.All.A real-time Linux system for autonomous navigation and fl ight attitude controlof an uninhabit edaerial vehicle.Proc.ofthe 20th Conference on DigitalAvionics Systems, 2001:1A11-1A19.

    [26]N.Ben Hadj Alouane,S.Lafrance,F.Lin,et al.Characterizing intransitive noninterference for 3-domain security policies with observability.IEEE Trans.on Automatic Control,2005, 50(6):920-925.

    Biographies

    Xiangying Kong was born in 1972.He received his B.S.degree in Xi’an Jiaotong University in 1995.He is currently a Ph.D.candiadate of Nanjing University of Aeronautics and Astronautics and a professor of Jiangsu Automation Research Institute.He presided over the development of multi-type electronic equipment and national defense pre-research project.His research interests include software engineering,information security and real-time operating system.

    E-mail:kongxy716@aliyun.com

    Yanhui Chen was born in 1973.She received her B.S.degree from Departmentof Computer Science, Southeast University.She is currently a senior engineer of Jiangsu Automation Research Institute.She presided over the development of multi-type automatic control system and C3Isystem.Her research interests include software engineering,information security and system engineering.

    E-mail:chenyh@jari.cn

    Yi Zhuang graduated from Department of Computer Science,Nanjing University of Aeronautics and Astronautics in 1981.She is now a Ph.D.supervisor in Nanjing University of Aeronautics and Astronautics.She has published over 50 papers in core journals or academic conferences at home and abroad.Besides,she has presided more than thirty state orprovincial projects,or scienti fi c and technological cooperation projects.Her research interests include network and distributed computing,and information security.

    E-mail:zhuangyi@nuaa.edu.cn

    10.1109/JSEE.2015.00043

    Manuscriptreceived April25,2014.

    *Corresponding author.

    This work was supported by the NaturalScience Foundation of Jiangsu Province(BK2012237).

    国产亚洲欧美精品永久| 日本av手机在线免费观看| 美国免费a级毛片| 久久久久久免费高清国产稀缺| 欧美黑人精品巨大| 欧美精品人与动牲交sv欧美| 国产精品欧美亚洲77777| netflix在线观看网站| 国产成人欧美| 国产欧美亚洲国产| 性高湖久久久久久久久免费观看| 国产极品粉嫩免费观看在线| 免费观看性生交大片5| 亚洲精品一区蜜桃| 国产精品久久久人人做人人爽| 色网站视频免费| 欧美日韩成人在线一区二区| 中国国产av一级| av不卡在线播放| 亚洲美女搞黄在线观看| 女性生殖器流出的白浆| 日本wwww免费看| xxxhd国产人妻xxx| 韩国高清视频一区二区三区| 欧美黄色片欧美黄色片| 成人手机av| 亚洲精品国产色婷婷电影| 老司机影院成人| 女人高潮潮喷娇喘18禁视频| 色网站视频免费| 日韩不卡一区二区三区视频在线| 国语对白做爰xxxⅹ性视频网站| 18禁动态无遮挡网站| 亚洲成人国产一区在线观看 | 中国三级夫妇交换| 99久久99久久久精品蜜桃| 悠悠久久av| 欧美黑人欧美精品刺激| 99香蕉大伊视频| 一边亲一边摸免费视频| 在线 av 中文字幕| 亚洲精品久久成人aⅴ小说| 国产免费福利视频在线观看| 国产成人啪精品午夜网站| 丝袜美足系列| 美女视频免费永久观看网站| tube8黄色片| 国产成人精品福利久久| 亚洲人成电影观看| 欧美人与性动交α欧美精品济南到| e午夜精品久久久久久久| 菩萨蛮人人尽说江南好唐韦庄| 亚洲欧洲日产国产| 亚洲精品第二区| 亚洲精品久久成人aⅴ小说| 美女脱内裤让男人舔精品视频| 国产欧美日韩综合在线一区二区| 精品少妇内射三级| 在线观看人妻少妇| 亚洲国产精品一区二区三区在线| 激情五月婷婷亚洲| 国产 精品1| 国产又爽黄色视频| 欧美xxⅹ黑人| 成人三级做爰电影| 99热全是精品| 亚洲视频免费观看视频| 亚洲精品,欧美精品| 免费av中文字幕在线| 成年人午夜在线观看视频| 日本91视频免费播放| 久久久久久久久久久免费av| 最近最新中文字幕免费大全7| 99久久综合免费| 亚洲国产成人一精品久久久| 久久久国产精品麻豆| 少妇被粗大猛烈的视频| 亚洲 欧美一区二区三区| 少妇的丰满在线观看| 青青草视频在线视频观看| 一级黄片播放器| 国产av一区二区精品久久| 欧美在线一区亚洲| 日韩av免费高清视频| www日本在线高清视频| 天天躁狠狠躁夜夜躁狠狠躁| 香蕉丝袜av| 99久久精品国产亚洲精品| av卡一久久| 成年av动漫网址| 日韩,欧美,国产一区二区三区| 成人手机av| 黄片播放在线免费| 国产欧美日韩一区二区三区在线| 午夜福利免费观看在线| 在线观看免费午夜福利视频| 日韩免费高清中文字幕av| 97在线人人人人妻| 国产福利在线免费观看视频| 国产精品 欧美亚洲| 在线 av 中文字幕| 18禁国产床啪视频网站| av免费观看日本| 日韩成人av中文字幕在线观看| 丝袜在线中文字幕| 大陆偷拍与自拍| 免费不卡黄色视频| a级毛片黄视频| 日韩一区二区视频免费看| 国产女主播在线喷水免费视频网站| 久久久久国产一级毛片高清牌| 2021少妇久久久久久久久久久| 中文字幕亚洲精品专区| 纯流量卡能插随身wifi吗| 中文字幕av电影在线播放| 久久热在线av| 一二三四在线观看免费中文在| 一个人免费看片子| 伦理电影大哥的女人| 亚洲av欧美aⅴ国产| 街头女战士在线观看网站| 老鸭窝网址在线观看| 精品国产露脸久久av麻豆| 亚洲精品美女久久久久99蜜臀 | 亚洲美女搞黄在线观看| 国产无遮挡羞羞视频在线观看| 中文字幕精品免费在线观看视频| 亚洲色图综合在线观看| 中文字幕最新亚洲高清| 又粗又硬又长又爽又黄的视频| 国产欧美日韩综合在线一区二区| av在线观看视频网站免费| 欧美精品一区二区免费开放| 亚洲天堂av无毛| 夫妻午夜视频| 国产成人91sexporn| 哪个播放器可以免费观看大片| a级毛片在线看网站| 亚洲一码二码三码区别大吗| 亚洲人成77777在线视频| 亚洲国产日韩一区二区| 欧美黄色片欧美黄色片| 午夜免费观看性视频| 国产成人系列免费观看| 亚洲美女搞黄在线观看| 欧美日韩亚洲高清精品| 一级黄片播放器| 一边摸一边抽搐一进一出视频| 亚洲国产最新在线播放| 啦啦啦在线免费观看视频4| 国产精品女同一区二区软件| svipshipincom国产片| 国产成人a∨麻豆精品| 亚洲人成电影观看| 欧美精品一区二区大全| 亚洲第一区二区三区不卡| 一区在线观看完整版| 一级毛片 在线播放| 亚洲国产最新在线播放| 女人高潮潮喷娇喘18禁视频| 久久久久久久久久久免费av| 操出白浆在线播放| 日韩成人av中文字幕在线观看| 国产精品久久久久久精品电影小说| 麻豆乱淫一区二区| 国产午夜精品一二区理论片| videosex国产| 制服诱惑二区| 国产日韩一区二区三区精品不卡| 高清欧美精品videossex| 国产在线一区二区三区精| 十八禁网站网址无遮挡| 只有这里有精品99| 国产激情久久老熟女| 日韩免费高清中文字幕av| 老熟女久久久| 国产又色又爽无遮挡免| 最近最新中文字幕大全免费视频 | 99精品久久久久人妻精品| 男女国产视频网站| 欧美日韩国产mv在线观看视频| 自线自在国产av| 久久毛片免费看一区二区三区| a级毛片在线看网站| 免费久久久久久久精品成人欧美视频| 男女高潮啪啪啪动态图| 97人妻天天添夜夜摸| 精品一区二区三卡| 男女床上黄色一级片免费看| 亚洲国产欧美一区二区综合| 久久久久国产一级毛片高清牌| av国产久精品久网站免费入址| 亚洲熟女毛片儿| 考比视频在线观看| 中文字幕另类日韩欧美亚洲嫩草| 中文欧美无线码| 中国三级夫妇交换| 一级毛片我不卡| 黄网站色视频无遮挡免费观看| 成年av动漫网址| 宅男免费午夜| 久久鲁丝午夜福利片| 欧美日韩视频精品一区| 在线观看国产h片| 亚洲婷婷狠狠爱综合网| 国产欧美日韩一区二区三区在线| 99re6热这里在线精品视频| 欧美亚洲 丝袜 人妻 在线| 国产视频首页在线观看| 欧美成人午夜精品| 91精品三级在线观看| 波多野结衣一区麻豆| 在线观看国产h片| 丝袜脚勾引网站| 亚洲伊人色综图| kizo精华| 国产不卡av网站在线观看| av有码第一页| 一区二区三区精品91| 中文字幕色久视频| 亚洲精品久久午夜乱码| 欧美日韩精品网址| 亚洲国产精品国产精品| 欧美老熟妇乱子伦牲交| 叶爱在线成人免费视频播放| 视频区图区小说| 在线观看国产h片| 亚洲一区中文字幕在线| avwww免费| 欧美日韩视频精品一区| av不卡在线播放| 90打野战视频偷拍视频| svipshipincom国产片| 十八禁高潮呻吟视频| 超色免费av| 午夜91福利影院| 考比视频在线观看| 亚洲国产欧美在线一区| 国产爽快片一区二区三区| 母亲3免费完整高清在线观看| 国产成人免费无遮挡视频| 国产又爽黄色视频| 少妇人妻久久综合中文| 激情视频va一区二区三区| 最近中文字幕2019免费版| 伦理电影免费视频| 精品一区二区三卡| 国产成人欧美在线观看 | 两个人免费观看高清视频| 亚洲一卡2卡3卡4卡5卡精品中文| 国产黄色视频一区二区在线观看| 男女之事视频高清在线观看 | 啦啦啦在线免费观看视频4| 两个人免费观看高清视频| 亚洲国产av新网站| 婷婷成人精品国产| 男女边摸边吃奶| 一级毛片我不卡| 久久久久精品人妻al黑| 亚洲国产精品一区三区| 日韩 欧美 亚洲 中文字幕| 国产极品粉嫩免费观看在线| 国产无遮挡羞羞视频在线观看| 午夜福利网站1000一区二区三区| 女人爽到高潮嗷嗷叫在线视频| a级片在线免费高清观看视频| e午夜精品久久久久久久| 精品国产超薄肉色丝袜足j| 高清黄色对白视频在线免费看| 国产成人免费无遮挡视频| 久久久欧美国产精品| 成人国语在线视频| 伊人久久大香线蕉亚洲五| 丝袜人妻中文字幕| 夜夜骑夜夜射夜夜干| 日韩,欧美,国产一区二区三区| 黑人猛操日本美女一级片| 国产日韩欧美亚洲二区| 少妇人妻 视频| 青春草国产在线视频| 男女免费视频国产| 热99国产精品久久久久久7| 久久鲁丝午夜福利片| 黑人猛操日本美女一级片| 国产亚洲精品第一综合不卡| 国产极品粉嫩免费观看在线| 中文字幕制服av| a级毛片在线看网站| 欧美乱码精品一区二区三区| 国产在线免费精品| 亚洲精品乱久久久久久| 久久久久网色| 色网站视频免费| 综合色丁香网| 欧美黄色片欧美黄色片| 国产视频首页在线观看| 中文字幕亚洲精品专区| 高清黄色对白视频在线免费看| 午夜91福利影院| 日本欧美视频一区| 91aial.com中文字幕在线观看| 不卡av一区二区三区| 90打野战视频偷拍视频| 国产1区2区3区精品| 亚洲欧美成人精品一区二区| 美女扒开内裤让男人捅视频| 欧美在线黄色| 成人国产av品久久久| 十八禁人妻一区二区| 一本大道久久a久久精品| 九草在线视频观看| 91老司机精品| 免费不卡黄色视频| 久久精品亚洲熟妇少妇任你| 天天添夜夜摸| 亚洲精品久久午夜乱码| 欧美激情 高清一区二区三区| 久久久国产一区二区| 日日啪夜夜爽| 菩萨蛮人人尽说江南好唐韦庄| 美女视频免费永久观看网站| 国产精品无大码| 欧美日韩精品网址| 久久久亚洲精品成人影院| 女人爽到高潮嗷嗷叫在线视频| 九草在线视频观看| 国产99久久九九免费精品| 亚洲精华国产精华液的使用体验| 久久久国产一区二区| 91成人精品电影| 人人妻人人澡人人看| 老汉色∧v一级毛片| 日韩一本色道免费dvd| 无限看片的www在线观看| 亚洲成色77777| 国产成人免费无遮挡视频| 高清视频免费观看一区二区| 久久热在线av| 国产毛片在线视频| 国产精品女同一区二区软件| 在线精品无人区一区二区三| 国产成人av激情在线播放| 成人午夜精彩视频在线观看| 一边亲一边摸免费视频| 精品视频人人做人人爽| 夫妻午夜视频| 男人添女人高潮全过程视频| 亚洲免费av在线视频| 亚洲av成人不卡在线观看播放网 | 国产伦人伦偷精品视频| 丰满少妇做爰视频| 亚洲成人av在线免费| 91精品国产国语对白视频| 国产精品二区激情视频| 日本av手机在线免费观看| 欧美激情 高清一区二区三区| 欧美中文综合在线视频| 男人添女人高潮全过程视频| 2018国产大陆天天弄谢| 午夜影院在线不卡| 国产精品免费大片| 国产精品香港三级国产av潘金莲 | 又黄又粗又硬又大视频| 狠狠婷婷综合久久久久久88av| 好男人视频免费观看在线| 国产一区二区激情短视频 | 男女边吃奶边做爰视频| 成年动漫av网址| 又粗又硬又长又爽又黄的视频| 少妇精品久久久久久久| 777米奇影视久久| 涩涩av久久男人的天堂| 两性夫妻黄色片| 激情视频va一区二区三区| 日韩大码丰满熟妇| 免费黄色在线免费观看| 成人手机av| 亚洲三区欧美一区| 亚洲七黄色美女视频| 色婷婷久久久亚洲欧美| 日韩人妻精品一区2区三区| 欧美日韩精品网址| 视频在线观看一区二区三区| 最近的中文字幕免费完整| 亚洲国产欧美一区二区综合| 久久人人爽人人片av| 亚洲一区二区三区欧美精品| 亚洲熟女毛片儿| 久久99精品国语久久久| 啦啦啦啦在线视频资源| 国产精品无大码| 国产成人欧美| 成人国产麻豆网| 在线亚洲精品国产二区图片欧美| 精品国产乱码久久久久久小说| 欧美日韩亚洲高清精品| 午夜老司机福利片| 在线观看人妻少妇| 午夜激情久久久久久久| 午夜福利一区二区在线看| 免费久久久久久久精品成人欧美视频| 蜜桃在线观看..| 青春草亚洲视频在线观看| 欧美变态另类bdsm刘玥| 成人影院久久| 熟女av电影| 色视频在线一区二区三区| 国产探花极品一区二区| 午夜福利视频精品| 国产有黄有色有爽视频| 2021少妇久久久久久久久久久| 男女下面插进去视频免费观看| av女优亚洲男人天堂| 天天躁夜夜躁狠狠久久av| 久热爱精品视频在线9| 日韩av在线免费看完整版不卡| 亚洲精品第二区| 欧美日韩成人在线一区二区| 老汉色∧v一级毛片| 欧美人与性动交α欧美精品济南到| 三上悠亚av全集在线观看| 99精品久久久久人妻精品| 成年av动漫网址| 精品一区二区免费观看| 搡老岳熟女国产| 国产亚洲午夜精品一区二区久久| 亚洲成人国产一区在线观看 | 婷婷色av中文字幕| 成人国产麻豆网| 亚洲少妇的诱惑av| 免费久久久久久久精品成人欧美视频| 国产成人午夜福利电影在线观看| 人人妻人人添人人爽欧美一区卜| 啦啦啦 在线观看视频| 日日爽夜夜爽网站| 免费观看人在逋| 亚洲自偷自拍图片 自拍| 国产成人精品久久二区二区91 | 国产免费现黄频在线看| 亚洲国产最新在线播放| 国产精品一区二区在线观看99| 中国国产av一级| 十八禁网站网址无遮挡| 日韩欧美精品免费久久| 制服丝袜香蕉在线| 少妇人妻精品综合一区二区| 国产精品偷伦视频观看了| 午夜精品国产一区二区电影| 成人国产av品久久久| 亚洲综合色网址| 午夜影院在线不卡| 女人精品久久久久毛片| 亚洲第一av免费看| 国产高清国产精品国产三级| 成年人免费黄色播放视频| 色播在线永久视频| 免费女性裸体啪啪无遮挡网站| 老司机影院成人| 在线看a的网站| 国产黄色视频一区二区在线观看| 人妻人人澡人人爽人人| 亚洲精品国产av蜜桃| 成人国产麻豆网| 高清在线视频一区二区三区| 成年女人毛片免费观看观看9 | 十八禁高潮呻吟视频| 精品久久蜜臀av无| 免费在线观看完整版高清| 丁香六月欧美| 天堂中文最新版在线下载| 国产精品免费视频内射| 日韩伦理黄色片| 97在线人人人人妻| 一级片'在线观看视频| 80岁老熟妇乱子伦牲交| 国产99久久九九免费精品| 久久ye,这里只有精品| 丝瓜视频免费看黄片| 国产黄色免费在线视频| 国产 精品1| 国产成人精品久久二区二区91 | 国产av码专区亚洲av| 曰老女人黄片| 久久99精品国语久久久| 97在线人人人人妻| 欧美另类一区| 99re6热这里在线精品视频| 王馨瑶露胸无遮挡在线观看| 亚洲av欧美aⅴ国产| 国产成人欧美| 亚洲成国产人片在线观看| 成年动漫av网址| 亚洲情色 制服丝袜| 人人妻人人澡人人爽人人夜夜| www日本在线高清视频| 十八禁人妻一区二区| 999久久久国产精品视频| 少妇的丰满在线观看| kizo精华| 天天躁日日躁夜夜躁夜夜| 男女下面插进去视频免费观看| 韩国高清视频一区二区三区| 日本vs欧美在线观看视频| 国产av一区二区精品久久| 亚洲 欧美一区二区三区| 免费观看人在逋| 国产乱来视频区| 午夜老司机福利片| 久久婷婷青草| 久久99热这里只频精品6学生| 人体艺术视频欧美日本| 国产精品国产三级国产专区5o| 日韩不卡一区二区三区视频在线| 国产淫语在线视频| 日本爱情动作片www.在线观看| 你懂的网址亚洲精品在线观看| 日韩 亚洲 欧美在线| 99香蕉大伊视频| 欧美av亚洲av综合av国产av | 亚洲av日韩精品久久久久久密 | 国产成人欧美| 国产成人欧美在线观看 | 男人操女人黄网站| 国产一区有黄有色的免费视频| 国产精品一区二区在线不卡| 成人免费观看视频高清| 9热在线视频观看99| 69精品国产乱码久久久| tube8黄色片| 丰满迷人的少妇在线观看| 天天添夜夜摸| 亚洲熟女毛片儿| 国产成人91sexporn| av视频免费观看在线观看| 免费观看性生交大片5| 欧美xxⅹ黑人| 婷婷色av中文字幕| 国产一区亚洲一区在线观看| 欧美人与善性xxx| av电影中文网址| 十八禁人妻一区二区| 国产亚洲精品第一综合不卡| 青春草亚洲视频在线观看| 天天添夜夜摸| 麻豆乱淫一区二区| 少妇人妻久久综合中文| 国产伦理片在线播放av一区| 亚洲综合精品二区| 久久精品亚洲av国产电影网| 女的被弄到高潮叫床怎么办| 国产亚洲欧美精品永久| 深夜精品福利| 又黄又粗又硬又大视频| 91国产中文字幕| av在线app专区| 男女高潮啪啪啪动态图| 人人妻人人澡人人爽人人夜夜| 黄色视频在线播放观看不卡| 成人国产麻豆网| 两个人免费观看高清视频| 中文字幕高清在线视频| 老鸭窝网址在线观看| 天天躁夜夜躁狠狠躁躁| 免费av中文字幕在线| 国产成人精品在线电影| 日韩 亚洲 欧美在线| 久久精品久久久久久噜噜老黄| 精品视频人人做人人爽| 久久国产亚洲av麻豆专区| 满18在线观看网站| 国产精品蜜桃在线观看| 大码成人一级视频| 日本黄色日本黄色录像| 男人爽女人下面视频在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美在线黄色| 日日摸夜夜添夜夜爱| 亚洲精品aⅴ在线观看| 欧美 日韩 精品 国产| 免费久久久久久久精品成人欧美视频| 国产精品.久久久| a 毛片基地| 欧美精品一区二区免费开放| 在线观看人妻少妇| 综合色丁香网| 亚洲一码二码三码区别大吗| 女人被躁到高潮嗷嗷叫费观| 精品午夜福利在线看| 亚洲精品美女久久av网站| 一边摸一边抽搐一进一出视频| 日韩精品有码人妻一区| 国产成人午夜福利电影在线观看| 人妻人人澡人人爽人人| 成人黄色视频免费在线看| 精品国产一区二区三区四区第35| av国产精品久久久久影院| 欧美精品一区二区大全| 亚洲图色成人| 精品第一国产精品| 国产伦人伦偷精品视频| 老司机靠b影院| 男女高潮啪啪啪动态图| 国产伦人伦偷精品视频| 熟妇人妻不卡中文字幕| 精品第一国产精品| 人成视频在线观看免费观看| 亚洲伊人色综图| 日本爱情动作片www.在线观看| 久久久亚洲精品成人影院| 波多野结衣av一区二区av| 国产成人免费无遮挡视频| 欧美亚洲 丝袜 人妻 在线| 日韩 欧美 亚洲 中文字幕| 王馨瑶露胸无遮挡在线观看| 亚洲熟女精品中文字幕|