期刊文献+

嵌入式系统安全问题解决方案综述

Security Solutions Research of Embedded System
下载PDF
导出
摘要 嵌入式系统大多具有较高的安全性和可靠性要求,但与此同时,其硬件资源往往相对有限,CPU的处理能力、内部存储空间均比通用计算机系统有明显差距。这使得嵌入式系统的安全性设计和解决方案面临很大的挑战。首先针对不同对象从不同层面具体分析了嵌入式系统的安全性需求,然后对基于安全构架的嵌入式结构体系做了较深入的研究,最后介绍了两种当今比较常用的提升嵌入式系统安全性的技术。 Most embedded systems have high security and reliability requirements. At the same time, their hardware resources are usually limited. The processing capability of their CPUs and internal storage space are both inferior to general computer systems. This makes the design and solving of security problem for embedded systems face great challenges. This paper firstly concretely analyses security requirements from different objects and different aspects, and then does some research on embedded frame struc- tures based on security framework. At last, the paper introduces two security technologies for embedded systems which are relatively commonly used at present.
出处 《微型电脑应用》 2013年第6期31-35,共5页 Microcomputer Applications
基金 教育部博士点基金(20100072110038) 国家自然科学基金项目(70871091 61075064 61034004 61005090) 教育部新世纪人才计划项目上海市信息化专项
关键词 嵌入式系统 安全性 结构体系 TrustZone技术 微核技术 Embedded System Security Structure System TrustZone Technology Micro-kernel Technology
  • 相关文献

参考文献4

  • 1Sigrid Gtirgens, Carsten Rudolph, etc. Security engi- neering for embedded systems--the SecFutur vision [J], ACM, 2010.
  • 2Markose, S. A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems[J], Embedded and Ubiquitous Computing, 2008.
  • 3EUC '08. Sen, S. Cryptosystem designed for embedded system security [J], VLSI Design, 2003.
  • 4裴华艳,裘雪红.嵌入式系统软件安全的分析与研究[J].电子科技,2009,22(8):28-32. 被引量:3

二级参考文献10

  • 1Arora D,,Ravi S,Raghunathan A,et al.Secure Em-bedded Processing through Hardware-assisted Runtime Monitoring[].ProcACM/IEEE DesignAuto-mationand Test in Europe(DATE).2005
  • 2Collberg C S,Thomborson C.Watermarking,Tamper-proofing,and Obfuscation-tools for Software Protection[].IEEE Tans Software Eng.2002
  • 3Edward Suh G,JaeWook Lee,Srinivas Devadas.Se-cure Program Execution via Dynamic Information Flow Tracking. Technical Report,MIT LCS TR-912 . 2003
  • 4Kiriansky V,Bruening D,Amarasinghe S P.Secure Ex-ecution Via Program Shepherding[].Proceedings of theth USENIX Security Symposium.2002
  • 5Smith S,Weingart S.Building A High-performance Programmable Secure Coprocessor[].The International Journal of Computer and Telecommunications Networking.1999
  • 6Neville-neil G V.Programming Without A net[].ACM Queue:Tomorrow s Computing Today.2003
  • 7Arora D,Raghunathan A,Ravi S.Enhancing Security Through Hardware-assisted Run-time Validation of Program Data Properties[].Proc ACM/IEEE Inter-national Conference on Hardware Software Co-design and System Synthesis(CODES+ISSS).2005
  • 8Ravi,S,Raghunathan,A,Kocher,P,Hattangady,S.Security in Embedded Systems:Design Challenges[].ACMTransactions on Embedded Computing Systems.2004
  • 9Shuo Chen,,Zb ign iew Kalbarczyk,Jun Xu,RavishankarK Iyer.A Data-D riven F in ite State Mach ine Model for Analyzing Security Vu lnerab ili-ties[].DSN.2003
  • 10HORNE B,MATHESON L,SHEEHAN C.Dynamic self-checkingtechniques for improved tamper resistance[].Proc of Security andPrivacy in Digital Rights Management.2001

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部