期刊文献+

基于AXI总线的安全防火墙研究与设计

Research and design of security firewall based on AXI bus
下载PDF
导出
摘要 为了增强So C的总线访问安全,阻止非法地址的访问行为,提出了基于AXI总线的分布式安全总线防火墙架构。针对不同的任务制定了多级可动态更新的安全策略,设计了具有较低延时的高速总线防火墙接口,增加了安全更新模块来保证策略配置与更新安全,结合系统的任务管理机制实现了面向多任务处理的任务隔离机制。实验结果表明,该防火墙的传输延时小、资源消耗少,可实现任务隔离。 In order to enhance the access security of the SoC bus, for stopping the illegal address access, this paper presents a distributed bus architecture with firewall security based on AXI bus. According to the different task, a multi-level security policy which can be dynamically updated is developed, the bus firewall interface with high-speed and low latency is designed and in- creased with a security update module to ensure policy configuration and update security, combine with task management system it achieves the task oriented isolation mechanism of multi-tasking. The experimental results show that the transmission delay of the firewall is small, low resource consumption, can achieve the task of isolation.
作者 刘志强 徐金甫 戴强 李军伟 Liu Zhiqiang Xu Jinfu Dai Qiang Li Junwei(The PLA Information Engineering University, Zhengzhou 450001, China)
出处 《电子技术应用》 北大核心 2017年第11期27-30,共4页 Application of Electronic Technique
关键词 总线安全 防火墙 安全更新 任务隔离 bus security firewall security update task isolation
  • 相关文献

参考文献1

二级参考文献62

  • 1Ravi S , Raghunathan A , et al. Security in embeddedsystems : Design challenges. ACM Transactions on EmbeddedComputing System s- 2004, 3 (3 ) : 461-491.
  • 2Kumar K. DRM on Android//Proceedings of the 10th IEEEIndia Conference. M um bai, India, 2013: 1-6.
  • 3Alves T , Felton D. TrustZone: Integrated hardware andsoftware security enabling trusted computing in embeddedsystem . Government Information Q uarterly, 2004, 3 (4 ) :18-24.
  • 4Anwar W , Lindskog D, et al. Redesigning secure elementaccess control for NFC enabled Android smartphones usingmobiletrusted computing//Proceedings of the 2013 InternationalConference on Information Society. Toronto, Canada,2013: 27-34.
  • 5ARM Limited. ARM Security Technology Building a SecureSystem using TrustZone Technology. W hite Paper, 2009.
  • 6Lee R B, Kwan P C S , et al. Architecture for protectingcritical secrets in microprocessors//Proceedings of the 32ndInternational Symposium on Computer Architecture. Madison,U SA , 2005: 2-13.
  • 7Wilson P- Frey A , et al. Implementing embedded security ondual-virtual-CPU systems//Proceedings of the Design andTest of ICs for Secure Embedded Computing. Shilong, India,2007: 582-591.
  • 8An Yang, Zhao Bo, Li IIong-Bo. Extension implementationof TCM in the embedded system based on FPGA//Proceedingsof the 2013 International Conference on Computer Scienceand Application. Wuhan, China, 2 0 13: 749-752.
  • 9Lie D, Thekkath C- et al. Architecture support for copy andtamper-resistant software//Proceedings of the ASP LOS-IX2000. Massachusetts, U SA, 2000: 1-10.
  • 10Suh G E- Clarke D- et al. AEGIS: Architecture for tamperevidentand tamper-resistant processing//Proceedings of the27th International Conference on Super computing. SanFrancisco, U S A ,2003: 1-12.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部