期刊文献+

TrustZone技术的分析与研究 被引量:30

Analysis and Research on TrustZone Technology
下载PDF
导出
摘要 互联网时代的到来给嵌入式应用系统带来了前所未有的发展机遇,但是随之而来的网络应用安全问题也使得嵌入式应用系统面临着越来越严重的威胁,安全性已经成为嵌入式系统设计中一项极为重要的需求.为此,ARM公司提出了基于TrustZone技术的一套系统级安全解决方案,该技术是在尽量不影响系统的功耗、性能和面积的前提下通过硬件来实现安全环境与普通环境的隔离,而软件提供基本的安全服务和接口,由软硬件相结合而构建系统安全,也正因为这些特点而受到国内外研究者的广泛关注.文中重点分析了TrustZone技术提供的安全隔离系统基本架构、安全机制的实现方式及如何构建可信执行环境.在此基础上将该技术与其他提高嵌入式安全的技术作了分析对比,也进一步探讨了其优势与不足之处,并针对不足之处提出了可能的解决方案.最后,深入讨论了该技术在学术领域的相关研究工作和商业应用情况,同时结合当前嵌入式应用领域存在的安全问题展望了该技术的未来发展方向和应用需求. The advent of the Internet era has brought the unprecedented development opportunities to the embedded application system, followed by the security issues of network applications which has led the embedded application system to be facing more and more serious threats. As a result, the security has become an extremely important requirement in the process of embedded system design. Therefore, ARM has proposed a set of system level security solutions based on TrustZone technology, which has implemented the isolation between the security environment and the normal environment by hardware and has also provided basic security services and interfaces by software. It has built the system security by combining hardware and software, however, it has no influence on performance, power consumption and area as far as possible. Due to those characteristic, the technology has gained wide attention of researchers from domestic and abroad. This paper has mainly analyzed the basic architecture of security isolation system provided by TrustZone technology, the way of security mechanism implement, and how to build the trusted execution environment. We have compared it with other technologies which can improve embedded system security, discussed the advantages and disadvantages of the technology in further, and proposed the possible solutions aiming at the deficiency as well. Furthermore, we have discussed the related research work in the academic field and business applications of the technology. At the end, we have prospected the future development direction and application requirement of the technology combining with the current security issues in the field of the embedded applications.
出处 《计算机学报》 EI CSCD 北大核心 2016年第9期1912-1928,共17页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2012AA01A401) 国家"核高基"科技重大专项基金项目(2013ZX01029003-001)资助~~
关键词 嵌入式系统 TrustZone技术 系统安全 ARM 系统结构 embedded system TrustZone technology system security ARM system architecture
  • 相关文献

参考文献62

  • 1Ravi S , Raghunathan A , et al. Security in embeddedsystems : Design challenges. ACM Transactions on EmbeddedComputing System s- 2004, 3 (3 ) : 461-491.
  • 2Kumar K. DRM on Android//Proceedings of the 10th IEEEIndia Conference. M um bai, India, 2013: 1-6.
  • 3Alves T , Felton D. TrustZone: Integrated hardware andsoftware security enabling trusted computing in embeddedsystem . Government Information Q uarterly, 2004, 3 (4 ) :18-24.
  • 4Anwar W , Lindskog D, et al. Redesigning secure elementaccess control for NFC enabled Android smartphones usingmobiletrusted computing//Proceedings of the 2013 InternationalConference on Information Society. Toronto, Canada,2013: 27-34.
  • 5ARM Limited. ARM Security Technology Building a SecureSystem using TrustZone Technology. W hite Paper, 2009.
  • 6Lee R B, Kwan P C S , et al. Architecture for protectingcritical secrets in microprocessors//Proceedings of the 32ndInternational Symposium on Computer Architecture. Madison,U SA , 2005: 2-13.
  • 7Wilson P- Frey A , et al. Implementing embedded security ondual-virtual-CPU systems//Proceedings of the Design andTest of ICs for Secure Embedded Computing. Shilong, India,2007: 582-591.
  • 8An Yang, Zhao Bo, Li IIong-Bo. Extension implementationof TCM in the embedded system based on FPGA//Proceedingsof the 2013 International Conference on Computer Scienceand Application. Wuhan, China, 2 0 13: 749-752.
  • 9Lie D, Thekkath C- et al. Architecture support for copy andtamper-resistant software//Proceedings of the ASP LOS-IX2000. Massachusetts, U SA, 2000: 1-10.
  • 10Suh G E- Clarke D- et al. AEGIS: Architecture for tamperevidentand tamper-resistant processing//Proceedings of the27th International Conference on Super computing. SanFrancisco, U S A ,2003: 1-12.

二级参考文献48

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Gartner. Worldwide smartphone sales in Q3 2013 [EB/OL]. [ 2014- 01-08 ]. http://www, gartner, com/newsroom/id/ 2623415.
  • 3AppBrian Stats. Number of available Android applications [EB/OL]. [2014-01-08]. http://www, appbrain, com/stats/.
  • 4Consumer Reports. Keep your phone safe-How to protect yourself from wireless threat [EB/OL].[ 2014-01-08 ]. http ://www. eonsumerreports, org/ero/net0613, htm # info.
  • 5TrustGo. BSides Las Vegas: Your droid has no clothes [EB/OL]. [2014-01-08]. http://blog, trustlook, corn/.
  • 6National Vulnerability Database. Vulnerability summary for eVE 2012-0056 [EB/OL]. [2013-12-09]. http..//web, nvd. nist. gov[view]vulnldetail?vulnId=CVE-2012-OO56&cid= 2.
  • 7Nakamura Y, Sameshima Y. SELinux for electronics devices [C]//Proe of Linux Symp. Ottawa:Linux Symp Inc, 2008: 125-133.
  • 8Bugiel S, Davi L, Dmitrienko A, et al. Practical and lightweight domain isolation on android [C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011:51-62.
  • 9Smalley S, Craig R. Security enhanced (SE) Android: bringing flexible MAC to Android [C/OL] //Proc of the 20th Annual Network and Distributed System Security Syrup. 2013 [2014-03-20]. http://www, internetsociety, org/events/ ndss-symposium- 2013 / papers-and- pr esentations.
  • 10Kim S H, Han D, Lee D H. Predictability of Android OpenSSL's pseudo random number generator [C] //Proc of the 2013 ACM SIGSAC Conf on Computer Communications Security. New York: ACM, 2013:659-668.

共引文献93

同被引文献145

引证文献30

二级引证文献93

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部