• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Dynamic Integrity Measurement Model Based on vTPM

    2018-03-13 06:26:01RuizhongDuWangyangPanJunfengTianCyberspaceSecurityandComputerCollegeBaoding0700ChinaKeyLaboratoryonHighTrustedInformationSysteminHebeiProvinceBaoding0700China
    China Communications 2018年2期

    Ruizhong Du, Wangyang Pan,*, Junfeng Tian Cyberspace Security and Computer College, Baoding 0700,China Key Laboratory on High Trusted Information System in Hebei Province, Baoding 0700, China

    I. INTRODUCTION

    Trusted computing technology goes through the measurement and verification of system integrity to ensure the system credibility[1]. It must rely on TCG (Trusted Computing Group)and TPM (Trusted Platform Module) to work.Firstly, TCG establishes the trusted computing specification. TPM, a hardware component,ensures integrity measuring. Then, when the application is in running, dynamic library linking and kernel module loading, IMA[2](Integrity Measurement Architecture) which patches in kernel will measure the code and key data and offer the results to TPM, then create a Metric List (ML). When challenging,PCR metric which signed by ML and TPM will be sent to the challenger to evaluate the platform trustworthy. And a lot of redundancy will be created by inserting metric points in the system call. PRIMA[3], which is on the improvement of IMA, goes through the use of the strategy of reducing the redundancy to improve the efficiency of the system. Meanwhile,IMA and PRIMA are both static measurement for the system process. The system will not in control when after the static measurement and the software load the system. BIND[4] system metrics and hook interface are determined by the programmer. It is clear that the measurement accuracy is relatively high, but increases the programmer’s workload. It is also hard to meet the compatibility requirements. LKIM[5]system puts kernel variable as a parameter and the changed parameter as the kernel trigger point. The drawback to the LKIM system is that the variable can only find modifications to the kernel, and the integrity of the application at the user level is powerless. Literature[6]proposed to use a metric agent to implement a dynamic metric architecture for a process.This metric architecture strategy is relatively passive. Only when the metric agent receives a metric request is measured, there may be a case where the metric was tampered with a long time after the measurement agent received a measurement request, but this time is too late, so the literature proposed by the lack of initiative to measure the structure. Literature[1] proposed a dynamic measurement model which based on virtualization technology. But the model is limited to the summary value of the program code , cannot achieve dynamic integrity. Literature[7] is concerned with the remote proof of the results after the implementation of the program. It proved the process of the implementation process by measuring the whole process of implementation of the target process and the other process,file data interaction. Literature[8] proposed a cloud-based virtual machine inside and outside the hybrid monitoring dynamic measurement framework. It compared the code segment and the parameter segment of the running program in a simple way and cannot obviously show its dynamic. Literature [9] proposed a dynamic measurement model based on virtualization technology, the model strategy is limited to the summary value of the program code, the way is relatively simple. Document [10] remotely verifies the results of the program through remote challenges, and proves that the program verifies the authenticity of the interaction with other processes during runtime. Literature [11]proposed a cloud-based virtual machine inside and outside the hybrid monitoring dynamic measurement framework, run the program code and parameters of the paragraph to measure and reference list for comparison, set the strategy is relatively simple, the type of single attack.

    Specific to Xen virtual machine system cannot ensure the dynamic integrity of client virtual machine when it is started. This paper put forward Dynamic Integrity Measurement Model (DIMM) of Xen Virtual Machine Based on vTPM. The main characteristic of the model is to dynamically measure the running process. The vTPM is used to encrypt the metric frame and the standard value in the process of measurement. Through the Self-modify measurement method, the historical measurement information is used as the index of the future measurement frequency, to reduce the measurement frequency enhance system security.The second part of this paper introduces the vTPM based Xen virtual machine dynamic integrity measurement model framework,the third part introduces the static measurement and dynamic measurement method, the fourth part tells the functional test and the performance test, the fifth part summarizes the whole paper and the last part is our acknowledgments fund items supported for this project.

    II. SYSTEM MODEL AND EXPRESSION

    The dynamic integrity measurement model of Xen virtual machine based on vTPM is composed of front-end static measurement part of client virtual machine and back-end dynamic measurement part of privileged virtual machine. The front-end is responsible for measuring some code segments and parameter segments necessary to run the program. The back-end dynamic measurement is realized by using virtual machine self-introspect, event capture technology and self-modify of the virtual as the measurement method.

    Figure 1 is the framework for dynamic integrity measurement of Xen virtual machines based on vTPM, showing static and dynamic interactions between user domains and administrative domains. The model consists mainly of six components. Measurement Agent (MA)is responsible for the interaction between the front end and the back end and maintains the process metric list. Integrity Verification Module (IMV) is responsible for verifying whether the metric meets the standard. Process Integrity Measurement Module (PIMM) is responsible for the integrity of the process code segment and data segment measurement. Measurement Control List (MCL) used to describe the process of measurement information.Event Capture Module (ECM) is responsible for intercepting the process system call. The LibVMI is responsible for reading the memory data in the user domain. When the VM_EXIT event occurs, Virtual Machine Control Structure (VMCS) will store the vCPU information of the guest virtual machine.

    The communication between Dom0 and DomU is realized by the ring message queue,event channel, authorization table and Xenstore mechanism. The ring message queue consists of a request queue and a response queue. Event channel is an asynchronous communication mechanism between Xen and Dom. Authorization tables are used in conjunction with shared memory. Xenstore, which managed and maintained by a privileged virtual machine, is used to transfer control information and configuration information among domains. In this paper, the privileged virtual machine, the management domain refers to the Dom0, and the client virtual machine, the user domain refers to DomU.

    Fig. 1. Framework for Dynamic Integrity Measurement of Xen Virtual Machines Based on vTPM.

    III. PROBLEM FOR MULATION

    3.1 Trusted chain transfer

    Trusted computing in physical machine is based on the support of TPM , while in virtual machine is based on virtual TPM (vTPM).Trusted chain is transferred to the virtual machine by vTPM in virtual environment. The vTPM is generated by the vTPM manager in the management domain, each client virtual machine corresponds to a vTPM. The privileged virtual machine corresponds to vTPM-0, the client virtual machine 1 corresponds to vTPM-1, the client virtual machine 2 corresponds to vTPM-2 ... Independent trusted computing based on TPM can be implemented to each client virtual machine by vTPM.

    Figure 2 shows the establishment fl ow chart of virtual machine trust chain. First, CRTM component measures the integrity of the BIOS,then BIOS detects the hardware reliability on the motherboard, and measures the GRUB and Xen.

    Hypervisor component. Make sure those critical hardware is trusted then give control to the management domain. The manager generates vTPM for each virtual machine user, and the vTPM will give a integrity measurement for all the application in user domain. That is a trusted chain from the physical hardware to the virtual machine.

    3.2 vTPM-based protection methods

    Relying on the support of vTPM, the dynamic integrity measurement model of Xen virtual machine based on vTPM can realize the key measurement, storage and reporting function of the system.

    1) Trust start to Client virtual machines

    vTPM-x (x=1,2, ...) physically plays a role in a privileged virtual machine and logically in the guest virtual machine. When the client virtual machine starts, vTPM measures the integrity of BIOS, bootloader and operating system kernel. Then stores the result in the vPCR of vTPM to ensures the trustworthiness of the initial state of the client’s virtual machine.

    2) Secure Start of Dynamic Metrics Framework

    After dynamic metrics framework started,vTPM measures the key components of the metrics architecture such as Integrity Verification Module, Metric Agent, and so on to ensure the security of the measurement architecture. To ensure security of the measurement architecture itself is the same important to the low coupling of the privileged virtual operating system and combine the trusted root provided by the trusted computing with the technologies such as trusted start and trust chain transfer. And put a series of security mechanisms based on trusted computing[12].

    3) The encryption and decryption to the metric list

    The vTPM provides platform encryption and decryption services to ensure the integrity of the benchmark. The data structure of the progress benchmark list follows:

    Struct measurement_list

    {

    Unsigned long Process_ID;// Process_ID used to uniquely identify a process

    SHA1-CTX h [Code_Hash];

    SHA1-CTX h [Data_Hash]; / * The hash value of the process data page whose value is stored in the array h [Data_Hash] * /

    SHA1-CTX context_hash; / * hash value of the process context * /

    }

    Fig. 2. The establishment fl ow chart of virtual machine trust chain.

    For the safety, the metrics list maintained by the Measurement Agent in the management domain is isolated from the user virtual machine on which the application is running. Use the vTPM encryption feature to encrypt each item in the metric list. vTPM generates a pair of secret keys (public key and private key) for each process. The specific process based on vTPM protection:

    (1) Let M be a process, K is a symmetric secret key generated by vTPM.

    (2) K encrypted M to obtain K {M};

    KPUBencrypted Process_ID and K to obtain KPUB{Process_ID, K}; If you want to get M,you must first get K, this time vTPM need KPRIdecrypt KPUB{Process_ID, K}. It is necessary to check Process_ID if the value is consistent,if not match the decryption operation fails, if the match can be obtained K, and then get the M, the encryption and decryption operations are completed by the vTPM.

    3.3 Static measurements

    A process is a form of dynamic execution of a program. The running process has an image file in memory[16], which reflects the function and information of the process, and the image is constantly changing[17]. The static metric measures the unaltered parameter value, initialized data (including initialized data segment, initialized stack segment). The frontend hashes the code to be measured, passes the measured hash value through the ring message queue in the virtual machine monitor to the back end of the integrity verification module[18]. If the measurement results and integrity of the benchmark value of the module (hash reference value provided by the manufacturer) is the same as the process, it can be trusted and move on. at this time , putting the integrity verification module design to the back end is a consideration for multiple client virtual machine. Adding an integrity verification module to each virtual user would increase its burden and adding full integrity to the management domain would cause frequent switching between the user domain and the admin domain. Comparison showed that the latter overhead is less than the former.

    Algorithm 1. Front-end static measurement FSM (Front-end Static Measurement)algorithm.Input: File absolute path, file attributes.Output: File hash value.FSM_Hash(File,Att1, Att 2, Att 3……) // The file’s absolute path (File) and file attribute information (Att1, Att2, Att3, ...){1. fp=FOPEN(File,”rb”)// Open the file you want to measure 2. FREAD(FiIeStream, 1,len, fp);// Read the contents of the file into memory 3. FiIe_hash=vTPM_SHA-1 (FileStream+ Att 1+ Att 2+ Att 3+ ……); //Invokes vTPM for hash operation and returns its value 4. FCL0SE(fp);5. ReturnFile_hash;}Step 1,write the needed measured file’s absolute path of the attribute information(including file type, open mode, file size, modification time, etc.) into the Process Integrity Measurement Module (PIMM).Step 2, PIMM opens the file in binary and reads it into memory , Calling the hash function vTPM_SHA-1 in vTPM to hash the file.Step3, return File_hash, the hash value will be passed to the integrity authentication module of Xen through the virtual machine monitor loop message queue.

    3.4 Dynamic measurements model DIMM

    TCG trusts the state of the platform for the behavior is executed according to the pre-strategy. The back-end dynamic measurement module mainly analyzes the behavior of the process, compare the actual behavior of the process and the pre-set trusted strategy.Trusted policies are developed by the system administrator. Back-end measurement mainly for key system calls, the system key file hash value, the expected strategy.

    3.4.1 Event Interception

    System call is a multi-core with a certain function that kernel provides. Event interception in Xen virtual machines refers to interception system calls in user domains[14]. Intercepts of system calls are behavioral monitoring. Event interception and control method in client system is one of the most key techniques to monitor client system[21]. Event intercept module,located in the Xen Virtual Machine Monitor(VMM) , is responsible for event interception.When the VM_EXIT event occurs, the CPU information of the guest virtual machine is stored in the virtual machine control structure (VMCS, VMCS in VMM). The privileged virtual machine can effectively reconstruct the semantic information of the system call by VMCS to identify use’ behaviors. Through the semantic gap that between the interception of information and virtual machine, VMCS need to transfer intercept the binary data into virtual machine internal high-level semantics.

    Interception includes the read and write files and the creation process of key events.The interception of the system call works with SYSENTER_CS_MSR, SYSENTER_ESP_MSR and SYSENTER_EIP_MSR[19]. The main steps as follows:

    1) The event capture module saves the register SYSENTER_EIP_MSR and sets it to a memory address that does not exist.

    2) When system call works in the guest virtual machine, the SYSENTER_EIP_MSR value that does not exist in memory will lead to page fault exception handling, resulting virtual machine VM_EXIT instruction. Then exception handling module can not be processed normally.

    3) Event acquisition module get the system call number from the customer virtual machine vCPU in the EAX register. The reason that exception handling module arise page fault, if the address does not exist (step 1), the client virtual machine can determine whether a system call has been made ,then continue to judge whether the process is creating or deleting. If the process is created, it can obtains the ESP pointer from VMCS then obtain the Thread_info structure. Thread_info contains a pointer to the task_struct structure, then obtain the related information about process , process number, process name and so on.

    4) Finally, in event module ,the saved original system call entry address that captured will be written back to the register SYSENTER_EIP_MSR, to execute the real system calls which in the kernel.

    3.4.2 Virtual machine introspection LibVMI[19] is a program developed by Brian D. Payne et al. Of Sandia[20] National Laboratory to provide virtual machine introspection. Using LibVMI on a guest virtual machine makes it easy to transparently read and write to the virtual machine’s memory.LibVMI in library and fuction is much better than XenAccess. LibVMI does not modify the virtual machine manager and the target operating system, thus avoiding the introduction of vulnerabilities and enhancing security. Figure 3 shows the deployment scenario of LibVMI.It shows the process that LibVMI get Linux kernel symbol table.

    The process of obtaining kernel symbol mainly by the follows: 1) Metric Proxy Requests view kernel symbols. 2) LibVMI obtains kernel symbol’s virtual address through System map. 3) Find the virtual address that corresponding to the kernel page directory,and obtain the corresponding page table. 4)Find the correct data page with the page table. 5) Return the data page to LibVMI. 6) Lib-VMI returns the data to the metric agent.

    Fig. 3. How to get Linux kernel symbol table with LibVMI.

    On Linux systems, when the executable imagefiles on the disk are loaded, the disk address space is mapped to the virtual address space.Each process in Linux has a process descriptor task_struct, which is in the header file linux/sched. In the process descriptor there is a member variable description process corresponding to the memory descriptor, called mm_struct.Each process has and only one mm_struct structure, it abstracts and describes the linux view of the process address space of all infor-mation, mm_struct defined in include/linux/mm_types.h. There is a point to a number of virtual storage space structure vm_area_struct link header mmap, through the header can be found in the process corresponding to all the virtual storage area, including some important member variables start_code, end_code, start_data, end_code and so on. The memory structure of the process is shown in Figure 4.

    Based on Libvmi, metric agent can obtain the data structure task_struct of the system kernel symbol in the client virtual machine.The data structure can be used to obtain the list of processes, and then the target process is mapped to the hash operation of the file memory, and the result is compared with the metric list maintained by the metric agent module Compare to determine whether the system behavior is malicious.

    The memory structure of the process is shown in Figure 4.

    On Linux systems, when the executable image files on the disk are loaded, the disk address space is mapped to the virtual address space.Each process in Linux has a process descriptor task_struct, which is in the header file linux/sched. In the process descriptor there is a member variable description process corresponding to the memory descriptor, called mm_struct.Each process has and only one mm_struct structure, it abstracts and describes the linux view of the process address space of all information, mm_struct defined in include/linux/mm_types.h. There is a point to a number of virtual storage space structure vm_area_struct link header mmap, through the header can be found in the process corresponding to all the virtual storage area, including some important member variables start_code, end_code, start_data, end_code and so on. The memory structure of the process is shown in Figure 4.

    Table I. Metric control lists.

    Fig. 4. Process memory organization.

    Based on Libvmi, metric agent can obtain the data structure task_struct of the system kernel symbol in the client virtual machine.The data structure can be used to obtain the list of processes, and then the target process is mapped to the hash operation of the file memory, and the result is compared with the metric list maintained by the metric agent module Compare to determine whether the system behavior is malicious.

    3.4.3 Self-modify dynamic measurement strategy

    Each user domain maintains a Measurement Control List (MCL), which is used to describe the information that the process is measuring.The design is shown in Table 1.

    Note: Tn (True numbers), said the current user domain of the process from the last measurement failure to the current cumulative measure of the number of correct. Fn (True numbers), said the current user domain the process from the last measurement is correct to the present cumulative measurement failures.Rt (Remaining time, the remaining time of the cycle), said the the remaining time from current user domain to the next , Sc (Scan cycle),which indicates the scan cycle of the metric agent to the measurement record list. Tcurrent is the interval between the two processes that are taken by the self-modifying metric.

    For the convenience of the study, the metric control list is initialized as follows: Tn= 0, Fn=0, Rt is initially the initial measurement cycle IMC (Initial Measurement Cycle) that does not take the self-modifying metric, Rt=IMC=30s,Sc = 5s. Tcurrent changes with Fn and Tn; the most recent measurement period Tcurrent is the value calculated by MA according to the Fn and Tn values in the current MCL.

    Tcurrent Calculation Method: The value of the measurement period Tcurrent is calculated from the original measurement period IMC and the measurement frequency F. The calculation method is Tcurrent = IMC/F, where F is calculated as follows:

    Example: Let a process for the P1, Fn= 0,Tn=100, you can calculate F=1/4, the measurement cycle Tcurrent = 4IMC=120s, that is, every 120s to do a measurement of the process; Fn=1, Tn=100, can be calculated F=5/2,the measurement cycle Tcurrent=0.4IMC=12s, that is, every 12s to do a measurement of the process. As can be seen from the example, the shorter the time from the next metric as the number of errors is increased...

    The specific process is as follows:

    Step 1: Initialize the MCL items, the initialization process as described in Section 3.3.3;

    Step 2: the remaining time of the cycle minus the metric agent scan cycle to determine whether the process should be measured, if you need to measure, turn Step 3, if you do not need to measure, turn Step 4;

    Step 3: determine the process is the correct measure or the wrong measure, if the correct measure to step 3.1, if the wrong measure,turn Step 3.2;

    Step 3.1: correct the number of measures plus 1, and update Rt;

    Step 3.2: Correct the number of measurements cleared, the number of error measures plus 1 and update Rt, notify the other user domain the process of measurement errors;

    Algorithm 2. Adaptive Dynamic Measurement Strategy ADMS (Adaptive Dynamic Measurement Strategy) pseudo-code algorithm.Enter: MCL table entries.Output: The updated MCL table entries.ADMS(MCL){1. Init(MCL);// Initialize the MCL table entries 2. Rt←Rt-Sc;3. if (Rt<=0);4. { Measure progress P;5. If (P)6. { Tn←Tn+1;7. Rt←Tcurrent; // If the process of measuring the right P Tn plus 1.8. }9. else 10. { Tn←0;11. Fn←Fn+1;12. Rt←Tcurrent;13. Notify other Dom; // If the process metric is wrong, Tn is 0, the error count is incremented by 1, and other user domains will be notified.14. }15. }16. else 17. end;18. Return(MCL);}

    Step 4: The metric ends and returns the MCL .

    3.4.4 The specific steps of back-end metrics

    1. Run the process of static measurement obtain the trust, the MCL table for all processes corresponding to the Rt minus SC, remove the list of Rt<=0 in the process, set these processes set to P1, the system is currently running the process of P2, then P1 ∩ P2 is the need to measure the process. The MCL sends the Process_ID that needs the metric to the MA.

    2. The ECM in the virtual machine monitor intercepts the system call of the running process. The measurement agent module obtains the relevant information of the process through the VMCS to check whether the system call sequence is consistent with the preset policy and whether sensitive operation is involved.Where Σ is a set of all system calls that may be performed by a program, Σ* is a set of all sequences on Σ that are determined by a preset strategy, and whether the system call sequence is in the Σ* set, that is, whether Set strategy consistent.

    3. The need to measure the process through the LibVMI mapping process will be the target of the implementation of its hash file operation, and the measurement agent module to compare the default value (event capture module can be opened through the task_struct process involved in the current file) , To determine whether the damage to the key system files (where the system kernel file is defined as a key file, such as certain documents can only be read and write by a specific process),update the MCL table, if the measurement error also notify other user domain, The user domain receives the notification and scans the MCL table and updates it.

    4. With the system call interception and Lib-VMI as the measurement means, the adaptive dynamic measure is used to identify and kill the threatening process running in the system.

    IV. TEST

    The function test and performance test of the proposed dynamic performance measurement model of Xen virtual machine based on vTPM. The function test is to test whether the proposed method can ensure the credibility of the process running. The performance test is to evaluate whether the overhead generated by the dynamic metric model is within the acceptable range. The performance test is compared with the classical static measurement model IMA, and the cost of the method proposed in this paper. Experimental environment configuration:chine manager installed on WindowsXP and Ubuntu12.04.1 system.

    4.1 Functional testing

    (1) Attacks on the SSH Program

    In the integrity measurement model, we select the more common attacks on the SSH program to illustrate its effectiveness. SSH is a protocol that provides secure remote login and other secure network services over an insecure network. An attacker acquires a user’s login by using a forged public key between a user and a remote host. Results are shown in Table 2. Table 2 (a) shows the attack before the system of all the processes to measure and calculate the hash value, Table 2 (b) shows after the attacker successfully attack on the SSH program, the program has been replaced by a modified procedure, and the hash value has changed. The system successfully detects the difference and rejects its running.

    (2) Tamper Attacks on Sub-modules

    Table 3 is the attack on sub-module, Table 3 (a) is the hash value before tampering, Table 3 (b) is the tampered hash value, we can see the hash value changed significantly from the figure, DIMM has identified out effectively.

    Hardware configuration: Intel Core i5 3.20GHZ * 4 processors, memory, 8GB, 1TB hard drive.

    Software configuration: virtual machine monitor (VMM) using Xen4.1.4 system, management domain virtual machine operating system using Ubuntu12.04.1, Xen virtual ma-

    4.2 Performance testing

    Performance test is a test for the system performance influenced by theb self-modifying dynamic metric DIMM model. Compare with the general Xen virtual platform and analyze the delay caused by the model.Experiments test the system call by using the Lmbench that is a simple and portable micro-evaluation tool.Select I/O from the Lmbench I/O to operate Null I/O, system call Null call, document state operate Stat, after document is opened,immediately shut down the operation of Open+close, read and write operations Write,Fork+exec Read and Fork execve operation is performed after. By comparing the DIMM model of Xen found in the test set of Null I/O,Null call, Stat, Open+close, Read and Write under Xen platform and time cost are close to the cost of Fork+exec is very large, Fork+exec operation to get the executable file of the hash value through the FSM algorithm in section 3.3, this part is the main reason for the DIMM model with a larger the Xen platform overhead, but the calculation of hash value calculated only once before running, with a smaller proportion of Fork+exec accounted for in system calls, so in DIMM this cost is within acceptable limits.

    Figure 5 is an example of a Self-modifying Dynamic Metric Measures. Assuming that k is the number of scans, k = 0 initializes 3 processes IMC is 30s, Sc is 5s, k∈ [0,8] ,belongs to first stage; When k = 9, process 1measurement error, Tcurrent = IMC / 10Fn = 30/10= 3s,At this point, the processes 2, 3 of the Tcurrent did not change, k ∈ [9,99] belongs to the second stage; When k = 100, 1 process Tcurrent = (IMC / 10Fn) / 4 = 12s, process 2,3 Tcurrent = IMC * 2 * 2 = 120s, k ∈ [100,999]belongs to the third stage; When k = 1045,process 2 measurement error, process 2Tcurrent = (IMC / 10) / 6 = 18s, while process1,3 calculation of Tcurrent are 180s, k ∈ [1000,∞] belongs to the fourth stage.

    It can be seen from Figure 5 that process3 does not occur measurement error. Along with the longer measurement interval, process1 is consistent with process 3 ,because process 1 occured error measurement in the second stage and did not have measurement error in the fourth stage. the process 2 occurs the measurement error the fourth stage that led to the measurement interval is less than the initialization time. Therefore, the self-modifying metric can reduce the metric frequency by using the historical metric as an indicator of the frequency of the future measurement.

    Table 5 is a performance comparison of DIMM dynamic metrics and IMA using static metrics. The table gives the number of processes, the process name, the metric, and the measurement time consuming. DIMM only includes CPU time consuming, IMA includes: I/O time consuming and metric time consuming.

    Table II(a). The results of the pre-attack experiments.

    Table II(b). The results of the pre-attack experiments.

    Table III(a). The hash value before tampering.

    Table III(b). Tampered hash value.

    Table IV. Comparison of DIMM model and xen system call test results (μs).

    As can be seen from Table 5, Time-consuming of 25 processes in DIMM and IMA CPU are 93.224ms, 812.726ms. ssh-agent, nautilus,netns ... gnome-terminal respectively are respectively key management processes, System file management process, network simulation process ... terminal simulation process. The time-consuming unit in these processes’ is in milliseconds. It is clear that the IMA total time is far greater than the DIMM model, which is due to the fact that the I/O operation time in the IMA static metric is almost occupied by the entire measurement time. The static metric needs to be measured by the disk by the disk.To the memory, and the DIMM dynamic measurement only need to be measured code from the user state copy to memory, fully aware of the performance of the DIMM model was signicantly better than the IMA model.

    Fig. 5. Comparison of examples of Self-modify dynamic measurement.

    Table V. Performance comparison of DIMM model and IMA.

    V. CONCLUSIONS

    This paper proposes a dynamic integrity measurement model of Xen virtual machine based on vTPM. The user domain and management domain in Xen respectively measure static and dynamic processes. This model enhances the dynamic integrity and security of virtual machines .Finally, the measurement framework is built by using integrity measure, system call intercept, virtual machine introspection technique and adaptive metric strategy. To a certain extent, to ensure the dynamic credibility of the platform, and has some anti-attack capability.The experiment proves the feasibility of the model. The limitations of the proposed model are that process of attacking can not be effectively identified, which is the author needs to improve and perfect the next step.

    ACKNOWLEDGEMENTS

    This project is supported by National Natural Science Foundation of China(61170254,61379116), Hebei Natural Science Foundation Project (F2016201244), Hebei Province Science and Technology Research Project of Higher Education (ZD2016043), Hebei Engineering Technology Research Center for IOT Data Acquisition & Processing, North China Insitute of Science and Technology, Hebei 065201,China,we hereby express our thanks.

    [1] Yang Bei. “Dynamic integrity measurement model based on trusted computing” [D].Shaanxi: Shaanxi Normal University, Master’s degree thesis,2011.

    [2] SAILER R, ZHANG Xiao-lan, JAEGER T, et al. “Design and implementation of a TCG-based integrity measurement architecture” [C].Proccedings of the 13th Conference on USENIX Security Symposium.Berkeley: USENIX Association, 2004: 223 -238.

    [3] JAEGER T, SAILER R, SHANKAR U. PRIMA: “Policy-reduced integrity measurement architecture”[C].Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York: ACM Press,2006: 19-28.

    [4] SHI E, PERRIG A, Van DOORN L. “BIND: anegrained attestation service for secure distributed systems”[C].Proceedings of IEEE Symposium on Security and Privacy. Washington DC: IEEEComputer Society,2005: 154-168 .

    [5] LOSCOCCO P A, WILSON P W, PENDERGRASS J A, et al. “Linux kernel integrity measurement using contextual inspection” [C].Proceedings of ACM Workshop on Scalable Trusted Computing.New York: ACM Press,2007: 21-29.

    [6] LIU Zi-Wen, FENG Deng-Guo. “Dynamic Integrity Measurement Architecture Based on Trusted Computing”[J].Journal of Electronics & Information Technology,2010, 32 (4): 875-879.

    [7] Gu Liang, Ding Xu-hua, Deng RH, Xie Bing, and Mei Hong. “Remote attestation on program execution”[C].Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing.Alexandria, Virginia, USA,2008: 11-20.

    [8] Y. Wang and Y. Luo. “An In-Out-VM measurement architecture against dynamic attacks in clouds”[C].In Proceedings of the 14th International Conference on Communication Technolog,Nov 2012.

    [9] Yang Bei. “Based on trusted computing dynamic integrity metrics model” [D].Shaanxi: Shaanxi Normal University,2011.6.

    [10] Gu Liang, Ding Xu-hua, eng R H, ie Bing, nd Mei Hong. “Remote Attestation on Program Execution”[C].Conference on Computer and Communications Security Proceedings of the3rd ACM Workshop on Scalable Trusted Computing.Alexandria, irginia, SA, 008: 11-20.

    [11] Y. Wang and Y. Luo. “An In-Out-VM Measurement Architecture Against Dynamic Dttacks in Clouds”[C].In Proceedings of the 14th International Conference on Communication Technolog,Nov 2012.

    [12] ZHANG Wen-rong. “Study on trust monitoring framework of cloud platform”[D].Wuhan:Huazhong University of Science and Technology,Master’s degree thesis, 2013.

    [13] Wang Jing. “Virtualization of Equipment with Strongly Isolated Operating System” [D].Beijing:University of Science and Technology of China,Ph.D.

    [14] Xin Siyuan. “Study on Trusted Architecture and Model of Trusted Operating System” [D].Zhengzhou:PLA University of Information Engineering,Ph.D.

    [15] Trusted Computing Group. TCG specification architecture overview,version1.4[EB/OL].[2013-04-22]. http://www.trustecomputinggroup.org/tcg_architecture_overview_version_14.

    [16] XIANG Guofu, GAI Hai. “Virtualization-based security monitoring”[J] .Journal of Software,2012,23 (8): 2173-2187.

    [17] Journal of Nanjing University of Science and Technology, 2010, 39 (2): 236-240. [14] SHI Yi,LI Shu-ying. Semantic Reconstruction Method Based on System Call Analysis in Xen Virtualization Platform [J].

    [18] http://code.google.com/p/vmitools/.

    [19] http://www.sandia.gov/.

    [20] Hou Wenting. “Design and Implementation of Personalized Security Monitoring System for Virtual Machine Based on Xen Platform”[D].Xi’an: Xi’an University of Electronic Science and Technology, Master’s Dissertation,2014.

    [21] Lin Jie, Liu Chuanyi. “IVirt: Virtual Machine Self-examination based on the operating environment integrity measurement mechanism”[J].Journal of Computers, 2015, 38 (1).

    99riav亚洲国产免费| 亚洲av电影不卡..在线观看| 亚洲国产色片| 欧美激情久久久久久爽电影| 国产欧美日韩一区二区三| av女优亚洲男人天堂| 国产在视频线在精品| 97碰自拍视频| 亚洲人成网站高清观看| 日韩欧美一区二区三区在线观看| 人妻久久中文字幕网| 久久婷婷人人爽人人干人人爱| 国产麻豆成人av免费视频| 两性午夜刺激爽爽歪歪视频在线观看| 狂野欧美白嫩少妇大欣赏| www.999成人在线观看| 国产午夜精品论理片| 亚洲国产色片| 波多野结衣高清无吗| 亚洲中文日韩欧美视频| 1024手机看黄色片| 69人妻影院| 国产成人福利小说| avwww免费| 欧美一区二区精品小视频在线| 日本在线视频免费播放| 免费看十八禁软件| 深夜精品福利| 亚洲美女黄片视频| 一个人看视频在线观看www免费 | 欧美日韩一级在线毛片| 综合色av麻豆| 欧美bdsm另类| 精品福利观看| 可以在线观看毛片的网站| 久久久久性生活片| 免费大片18禁| 亚洲国产精品sss在线观看| 黄色成人免费大全| 免费一级毛片在线播放高清视频| 午夜激情欧美在线| 长腿黑丝高跟| 特级一级黄色大片| 欧美色欧美亚洲另类二区| av在线天堂中文字幕| 亚洲 国产 在线| 亚洲成av人片免费观看| 精品乱码久久久久久99久播| 国产伦一二天堂av在线观看| 国产麻豆成人av免费视频| 日韩欧美免费精品| 久久婷婷人人爽人人干人人爱| 老汉色∧v一级毛片| 久久久久久久亚洲中文字幕 | 欧美激情久久久久久爽电影| 天堂av国产一区二区熟女人妻| 在线免费观看不下载黄p国产 | 一本一本综合久久| 亚洲av日韩精品久久久久久密| 亚洲乱码一区二区免费版| 白带黄色成豆腐渣| 制服人妻中文乱码| 美女 人体艺术 gogo| 国产精品 国内视频| 国产精品一区二区三区四区久久| 人人妻人人澡欧美一区二区| 欧美日韩瑟瑟在线播放| 高清在线国产一区| 男插女下体视频免费在线播放| 欧美日韩亚洲国产一区二区在线观看| 99精品欧美一区二区三区四区| 午夜两性在线视频| 麻豆一二三区av精品| 狂野欧美激情性xxxx| 久久久久久久精品吃奶| 色吧在线观看| 亚洲av成人不卡在线观看播放网| 淫妇啪啪啪对白视频| 操出白浆在线播放| 久久亚洲真实| 国产精品免费一区二区三区在线| 国内精品一区二区在线观看| 尤物成人国产欧美一区二区三区| 久99久视频精品免费| 欧美av亚洲av综合av国产av| 婷婷精品国产亚洲av| 久久久久精品国产欧美久久久| 一进一出抽搐动态| 久久久精品欧美日韩精品| 午夜福利18| 又黄又爽又免费观看的视频| 国产亚洲精品久久久com| 久久中文看片网| 久久人人精品亚洲av| 国产精品1区2区在线观看.| 国产精品 欧美亚洲| 国产精品久久久久久人妻精品电影| 日韩欧美三级三区| 在线天堂最新版资源| 中文字幕久久专区| 内地一区二区视频在线| 亚洲人成电影免费在线| 精品久久久久久久末码| 床上黄色一级片| 国产精品香港三级国产av潘金莲| 精品不卡国产一区二区三区| 成人国产综合亚洲| 久久国产精品人妻蜜桃| 日本三级黄在线观看| 日本黄色片子视频| 男人和女人高潮做爰伦理| 欧美日韩乱码在线| 亚洲精品成人久久久久久| 熟妇人妻久久中文字幕3abv| 两个人看的免费小视频| 特大巨黑吊av在线直播| 午夜精品在线福利| 国产黄色小视频在线观看| 亚洲av成人av| 国产男靠女视频免费网站| 欧美最新免费一区二区三区 | 亚洲国产精品999在线| 免费无遮挡裸体视频| 在线观看日韩欧美| 久久久久国内视频| 久久久国产成人免费| 丰满人妻一区二区三区视频av | 97碰自拍视频| 色哟哟哟哟哟哟| av福利片在线观看| 免费一级毛片在线播放高清视频| 精品人妻一区二区三区麻豆 | xxx96com| 亚洲av电影不卡..在线观看| 久久午夜亚洲精品久久| 亚洲欧美一区二区三区黑人| 五月玫瑰六月丁香| 国产99白浆流出| 欧美不卡视频在线免费观看| 欧美高清成人免费视频www| 国产成人a区在线观看| 久久久国产成人精品二区| 三级毛片av免费| 午夜福利在线观看吧| 男女之事视频高清在线观看| 91麻豆精品激情在线观看国产| 国产野战对白在线观看| 亚洲一区二区三区色噜噜| 网址你懂的国产日韩在线| 麻豆一二三区av精品| 在线播放无遮挡| 精品不卡国产一区二区三区| 三级国产精品欧美在线观看| 精华霜和精华液先用哪个| 欧美黄色片欧美黄色片| 有码 亚洲区| 日本 av在线| 男女午夜视频在线观看| 全区人妻精品视频| 亚洲最大成人中文| 美女被艹到高潮喷水动态| 国产综合懂色| 中出人妻视频一区二区| 国产精品美女特级片免费视频播放器| 国产淫片久久久久久久久 | 亚洲久久久久久中文字幕| 三级毛片av免费| 在线观看日韩欧美| 青草久久国产| 热99re8久久精品国产| 欧美日韩福利视频一区二区| 俺也久久电影网| 亚洲七黄色美女视频| 亚洲无线在线观看| 国产精品一及| 国内揄拍国产精品人妻在线| 久久久久亚洲av毛片大全| 日韩中文字幕欧美一区二区| 白带黄色成豆腐渣| 老司机深夜福利视频在线观看| 脱女人内裤的视频| xxx96com| 9191精品国产免费久久| xxx96com| 久久伊人香网站| 色av中文字幕| 国产成人欧美在线观看| e午夜精品久久久久久久| 麻豆成人午夜福利视频| 亚洲精品影视一区二区三区av| 99国产综合亚洲精品| 国产成人福利小说| 九色成人免费人妻av| 日本精品一区二区三区蜜桃| 午夜免费观看网址| 午夜免费观看网址| 五月伊人婷婷丁香| 久久欧美精品欧美久久欧美| 午夜福利在线观看免费完整高清在 | 国产主播在线观看一区二区| 亚洲av成人av| 偷拍熟女少妇极品色| 一边摸一边抽搐一进一小说| 狂野欧美白嫩少妇大欣赏| 蜜桃亚洲精品一区二区三区| 精品久久久久久久久久免费视频| 欧美乱色亚洲激情| 亚洲电影在线观看av| 五月伊人婷婷丁香| 亚洲国产欧洲综合997久久,| 女人十人毛片免费观看3o分钟| 热99在线观看视频| 亚洲中文字幕一区二区三区有码在线看| 波多野结衣高清无吗| 久久精品夜夜夜夜夜久久蜜豆| 免费av毛片视频| www.999成人在线观看| 亚洲av电影在线进入| 久久精品91无色码中文字幕| 亚洲精品久久国产高清桃花| 亚洲五月天丁香| 日韩av在线大香蕉| 青草久久国产| 亚洲欧美激情综合另类| 亚洲avbb在线观看| 最近最新中文字幕大全电影3| 亚洲中文日韩欧美视频| 又黄又粗又硬又大视频| 国产亚洲精品av在线| 麻豆一二三区av精品| 国产精品98久久久久久宅男小说| 又紧又爽又黄一区二区| 成人国产综合亚洲| 搞女人的毛片| 日韩欧美 国产精品| 大型黄色视频在线免费观看| 亚洲一区二区三区色噜噜| 国产毛片a区久久久久| 中文资源天堂在线| 欧美高清成人免费视频www| 日韩欧美在线乱码| a级一级毛片免费在线观看| 亚洲国产欧美网| 变态另类成人亚洲欧美熟女| 国产午夜福利久久久久久| 1000部很黄的大片| 国内少妇人妻偷人精品xxx网站| 老熟妇仑乱视频hdxx| 人人妻人人澡欧美一区二区| 精华霜和精华液先用哪个| 日韩成人在线观看一区二区三区| 国产蜜桃级精品一区二区三区| 国产精品日韩av在线免费观看| 亚洲av一区综合| 啪啪无遮挡十八禁网站| 午夜福利免费观看在线| 精品国产美女av久久久久小说| 国产精品香港三级国产av潘金莲| 男人舔女人下体高潮全视频| 少妇丰满av| avwww免费| 麻豆国产97在线/欧美| 69人妻影院| 俺也久久电影网| 亚洲人与动物交配视频| 国产精品久久久久久久久免 | 黄色日韩在线| 网址你懂的国产日韩在线| 一区二区三区激情视频| 国产av在哪里看| 丰满的人妻完整版| 亚洲av成人av| 日本免费a在线| а√天堂www在线а√下载| 色播亚洲综合网| 99在线视频只有这里精品首页| 成年免费大片在线观看| 级片在线观看| 一区二区三区国产精品乱码| 在线a可以看的网站| 国产99白浆流出| 午夜福利18| 国产91精品成人一区二区三区| 99在线人妻在线中文字幕| 欧美成人a在线观看| 久久久国产成人免费| 亚洲第一电影网av| 久久精品亚洲精品国产色婷小说| 午夜两性在线视频| 久久久久亚洲av毛片大全| 久久欧美精品欧美久久欧美| www.色视频.com| 久久久久久国产a免费观看| 国产国拍精品亚洲av在线观看 | 天堂影院成人在线观看| 中文字幕久久专区| 国产熟女xx| 精品一区二区三区视频在线观看免费| 亚洲成人中文字幕在线播放| 国产av不卡久久| 免费搜索国产男女视频| 欧美日韩一级在线毛片| 欧美一级毛片孕妇| 脱女人内裤的视频| 欧美精品啪啪一区二区三区| 一级黄色大片毛片| 欧美日本亚洲视频在线播放| 国产精品久久久人人做人人爽| 亚洲熟妇熟女久久| 一个人免费在线观看电影| 青草久久国产| 欧美成人免费av一区二区三区| 日本三级黄在线观看| 免费av观看视频| 欧美日韩黄片免| 精品人妻偷拍中文字幕| 久久亚洲精品不卡| 国产一区二区三区在线臀色熟女| 午夜免费激情av| 久久久国产成人精品二区| 国产色婷婷99| 岛国在线观看网站| 国产视频一区二区在线看| 午夜福利18| 亚洲精品美女久久久久99蜜臀| 99国产综合亚洲精品| 狂野欧美激情性xxxx| 五月玫瑰六月丁香| 成人无遮挡网站| 国产精品 欧美亚洲| 亚洲中文字幕一区二区三区有码在线看| 变态另类丝袜制服| 在线观看日韩欧美| 91九色精品人成在线观看| 国产真人三级小视频在线观看| 在线观看午夜福利视频| 免费观看精品视频网站| 欧美一区二区精品小视频在线| 深爱激情五月婷婷| 最新在线观看一区二区三区| 久久精品亚洲精品国产色婷小说| 无遮挡黄片免费观看| 两个人视频免费观看高清| 国内久久婷婷六月综合欲色啪| 日韩中文字幕欧美一区二区| 国产一区二区激情短视频| 国产成人欧美在线观看| 在线观看66精品国产| 有码 亚洲区| svipshipincom国产片| 日韩中文字幕欧美一区二区| 国产一区二区在线av高清观看| 欧美日韩一级在线毛片| 中文字幕高清在线视频| 伊人久久大香线蕉亚洲五| av在线天堂中文字幕| 97超级碰碰碰精品色视频在线观看| 一本综合久久免费| 在线视频色国产色| 国产成人影院久久av| 亚洲成av人片在线播放无| 精品久久久久久,| 欧美日韩乱码在线| 日韩欧美国产在线观看| 亚洲专区中文字幕在线| 两个人视频免费观看高清| 亚洲不卡免费看| 午夜福利在线观看免费完整高清在 | 午夜亚洲福利在线播放| 色av中文字幕| 午夜两性在线视频| 九色成人免费人妻av| 99久久精品国产亚洲精品| 欧美乱色亚洲激情| 国产一区二区在线观看日韩 | 蜜桃久久精品国产亚洲av| 黄色日韩在线| 88av欧美| 97超级碰碰碰精品色视频在线观看| 国产探花极品一区二区| 国产主播在线观看一区二区| 国产一区二区在线观看日韩 | 亚洲在线自拍视频| 夜夜看夜夜爽夜夜摸| 久久久国产精品麻豆| 亚洲第一欧美日韩一区二区三区| 久久国产精品影院| 19禁男女啪啪无遮挡网站| e午夜精品久久久久久久| 国语自产精品视频在线第100页| 精品国产美女av久久久久小说| 午夜精品久久久久久毛片777| 亚洲中文日韩欧美视频| 久久精品国产亚洲av香蕉五月| 别揉我奶头~嗯~啊~动态视频| 欧美日韩瑟瑟在线播放| 丰满人妻一区二区三区视频av | 高潮久久久久久久久久久不卡| 久久精品人妻少妇| 成人午夜高清在线视频| 国产色爽女视频免费观看| 12—13女人毛片做爰片一| 亚洲狠狠婷婷综合久久图片| www国产在线视频色| 欧美日韩黄片免| 99国产精品一区二区蜜桃av| 日本在线视频免费播放| 成人av一区二区三区在线看| 亚洲无线在线观看| www国产在线视频色| 亚洲 欧美 日韩 在线 免费| 淫秽高清视频在线观看| 91麻豆av在线| 三级国产精品欧美在线观看| 搡老妇女老女人老熟妇| 国产成人a区在线观看| 国产精品99久久久久久久久| 男女午夜视频在线观看| 十八禁人妻一区二区| 色综合婷婷激情| 国产精品久久久久久精品电影| 午夜激情欧美在线| h日本视频在线播放| 国产国拍精品亚洲av在线观看 | 国产探花在线观看一区二区| av中文乱码字幕在线| 国产精品久久久久久人妻精品电影| 成人精品一区二区免费| 在线观看一区二区三区| 好男人在线观看高清免费视频| 天天一区二区日本电影三级| 国产精品一区二区三区四区久久| 国产中年淑女户外野战色| 国内精品一区二区在线观看| 国产一区二区激情短视频| 内地一区二区视频在线| 久久久久久九九精品二区国产| 啪啪无遮挡十八禁网站| 9191精品国产免费久久| 日韩欧美三级三区| 桃色一区二区三区在线观看| 亚洲中文字幕日韩| 日韩欧美免费精品| a级一级毛片免费在线观看| 国内揄拍国产精品人妻在线| 热99re8久久精品国产| 老司机在亚洲福利影院| 床上黄色一级片| 亚洲不卡免费看| 亚洲乱码一区二区免费版| 老鸭窝网址在线观看| 国产亚洲精品综合一区在线观看| 亚洲,欧美精品.| 91麻豆av在线| 亚洲av成人不卡在线观看播放网| 色精品久久人妻99蜜桃| 国产熟女xx| 久久精品影院6| svipshipincom国产片| 久久精品人妻少妇| 午夜老司机福利剧场| 亚洲欧美日韩东京热| 亚洲国产欧美人成| 他把我摸到了高潮在线观看| 波多野结衣高清作品| 亚洲国产中文字幕在线视频| 嫩草影视91久久| 日韩欧美精品免费久久 | 日韩欧美国产在线观看| 99国产极品粉嫩在线观看| 美女cb高潮喷水在线观看| 亚洲va日本ⅴa欧美va伊人久久| 女生性感内裤真人,穿戴方法视频| 欧美国产日韩亚洲一区| 国产午夜精品久久久久久一区二区三区 | 日本黄色视频三级网站网址| 欧美激情在线99| 日日夜夜操网爽| 美女黄网站色视频| 免费看日本二区| 国产精品综合久久久久久久免费| 天天躁日日操中文字幕| 啦啦啦观看免费观看视频高清| 五月伊人婷婷丁香| 成人av在线播放网站| 午夜两性在线视频| 欧美在线一区亚洲| 内射极品少妇av片p| 国产精品日韩av在线免费观看| 中文字幕人妻熟人妻熟丝袜美 | 可以在线观看的亚洲视频| 夜夜看夜夜爽夜夜摸| 丝袜美腿在线中文| 韩国av一区二区三区四区| 九九热线精品视视频播放| 中文字幕久久专区| 一进一出好大好爽视频| 老司机福利观看| 亚洲精品在线观看二区| 国产成人av激情在线播放| 91字幕亚洲| 国产精品嫩草影院av在线观看 | 久久精品国产清高在天天线| 狂野欧美激情性xxxx| 亚洲精品亚洲一区二区| 毛片女人毛片| 又紧又爽又黄一区二区| 免费人成视频x8x8入口观看| 欧美最黄视频在线播放免费| 99久久精品热视频| 久久精品国产99精品国产亚洲性色| 两个人的视频大全免费| 一边摸一边抽搐一进一小说| 在线十欧美十亚洲十日本专区| 国产成人福利小说| 精品久久久久久久久久免费视频| 久久婷婷人人爽人人干人人爱| 亚洲第一欧美日韩一区二区三区| 日韩欧美国产一区二区入口| a在线观看视频网站| 在线十欧美十亚洲十日本专区| 听说在线观看完整版免费高清| 中文字幕高清在线视频| 波多野结衣高清作品| xxx96com| 国产蜜桃级精品一区二区三区| 法律面前人人平等表现在哪些方面| 最好的美女福利视频网| 亚洲人与动物交配视频| 国产爱豆传媒在线观看| tocl精华| 亚洲国产高清在线一区二区三| 午夜福利在线观看吧| 欧美不卡视频在线免费观看| 叶爱在线成人免费视频播放| 看黄色毛片网站| 哪里可以看免费的av片| 亚洲在线自拍视频| 中文字幕人妻丝袜一区二区| 国产高清videossex| 久久精品国产亚洲av香蕉五月| 又黄又粗又硬又大视频| 中文字幕熟女人妻在线| 少妇的逼水好多| 国产精品日韩av在线免费观看| 国产精品电影一区二区三区| 少妇的逼好多水| 日日夜夜操网爽| АⅤ资源中文在线天堂| 国产探花在线观看一区二区| 十八禁网站免费在线| 黄色丝袜av网址大全| 国产一区在线观看成人免费| 欧美中文日本在线观看视频| 日本五十路高清| 国产日本99.免费观看| 男人舔奶头视频| 精品熟女少妇八av免费久了| 亚洲一区二区三区色噜噜| 毛片女人毛片| 不卡一级毛片| 免费观看的影片在线观看| 国产视频一区二区在线看| 天天躁日日操中文字幕| 老司机在亚洲福利影院| 嫁个100分男人电影在线观看| 精品不卡国产一区二区三区| 18禁裸乳无遮挡免费网站照片| 激情在线观看视频在线高清| 搡老妇女老女人老熟妇| 一本综合久久免费| 国产高清有码在线观看视频| 国产精品99久久99久久久不卡| 国产成人影院久久av| 999久久久精品免费观看国产| 亚洲欧美日韩高清专用| 欧美日韩黄片免| 亚洲成人久久爱视频| 亚洲 国产 在线| 久久久久性生活片| 国产三级在线视频| 美女高潮的动态| 美女大奶头视频| 99久国产av精品| 欧美bdsm另类| svipshipincom国产片| 黄色女人牲交| 精品人妻一区二区三区麻豆 | 真人做人爱边吃奶动态| 丰满乱子伦码专区| 内射极品少妇av片p| 观看美女的网站| 特级一级黄色大片| 岛国在线免费视频观看| 网址你懂的国产日韩在线| 欧美成人a在线观看| 国产精品亚洲一级av第二区| 毛片女人毛片| 亚洲精品在线观看二区| 人妻久久中文字幕网| 久久久成人免费电影| 一本精品99久久精品77| 深夜精品福利| 窝窝影院91人妻| 极品教师在线免费播放| 内射极品少妇av片p| 一个人观看的视频www高清免费观看| 欧美日韩综合久久久久久 | 亚洲无线观看免费| 欧美zozozo另类| 久久国产精品影院| 男人和女人高潮做爰伦理| 91字幕亚洲| 精品午夜福利视频在线观看一区| 亚洲激情在线av|