期刊文献+

抗物理攻击存储安全技术研究综述 被引量:1

Survey of research on physical attack-resistant secure memory techniques
下载PDF
导出
摘要 设定处理器片上安全,围绕抗物理攻击存储安全关键技术进行研究,给出了物理攻击的定义及抗物理攻击技术的潜在应用场景;通过对安全系统模型进行比较、分析,总结了安全体系结构设计的研究现状;结合密码保护技术,回顾了单处理器结构和多处理器结构中的数据保护方法:数据机密性、数据完整性、防重放攻击技术,分析了多处理器结构中共享秘密技术及cache间安全通信技术。 On the assumption that the processor area was secure, the paper presented a research on physical attack-resistant memory security key techniques.Gave a definition of physical attack and the application scenes of physical attack-resistant techniques,summarized the research status of secure system design by analyzing the secure system models and the differences between them.Introduced the data protection methods on uniprocessor and multiprocessor archirectures, analyzed the secret sharing techniques and the secure communication techniques between caches.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1601-1605,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z446)
关键词 物理攻击 加密 解密 机密性 完整性 重放攻击 physical attack encryption decryption confidentiality integrity replay attack
  • 相关文献

参考文献22

  • 1LIE D,THEKKATH C A,MITCHELL M,et al.Architectural support for copy and tamper resistant software[J].ACM SIGPLAN Notices,2000,35(11):168-177.
  • 2SUH G E,CLARKE D,GASSEND B,et al.AEGIS:architecture for tamper-evident and tamper-resistant processing[C]//Proc of the 17th International Conference on Super-computing.New York:ACM Press,2003:160-171.
  • 3SUH G E,CLARKE D,GASSEND B,et al.Efficient memory integrity verification and encryption for secure processors[C]//Proc of the 36th Annual IEEE/ACM International Symposium on Microarchitecture.New York:ACM Press,2003:339-349.
  • 4SHI W,LEE H S,GHOSH M,et al.High efficient counter mode security architecture via prediction and precomputation[C]//Proc of the 32nd International Symposium on High-Performance Computer Architecture.Washington DC:IEEE Computer Society,2005:14-24.
  • 5ROGERS B,CHHABRA S,SOLIHIN Y,et al.Using address independent seed encryption and Bonsai Merkle trees to make secure processors OS-and performance -friendly[C]//Proc of the 40th Annual IEEE/ACM International Symposium on Microarchitecture.New York:ACM Press,2007:183-196.
  • 6ZHANG You-tao,GAO Lan,YANG Jun,et al.SENSS:security enhancement to symmetric shared memory multi -processors[C]//Proc of the 11th International Symposium on High-Performance Computer Architecture.2005:352-362.
  • 7CLARKE D,DEVADAS S,van DIJK M,et al.Incremental multiset hash functions and their application to memory integrity checking[C]//Proc of the 9th Conference on Theory and Application of Cryptology and Information Security.Berling:Springer,2003:188-207.
  • 8ZHANG You-tao,YANG Jun,GAO Lan.Improving memory encryption performance in secure processor[J].IEEE Trans on Computers,2005,54(5):630-640.
  • 9ROGERS B,CHEN Y,CHHABRA S.Single-level integrity and confidentiality protection for distributed shared memory multiprocessors[C]//Proc of the 14th International Symposium on High Performance Computer Architecture.2008:161-172.
  • 10IBRAHIM K Z.Efficient architectural support for secure bus-based shared memory multiprocessor[C]//Proc of the 10th Asia-Pacific Conference on Advances in Computer Systems Architecture.2005:640-654.

同被引文献9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部