期刊文献+

嵌入式控制软件保密性设计研究与应用 被引量:1

Research and Application of Embedded Control Software Security Design
下载PDF
导出
摘要 分析了当前嵌入式控制软件所面临的主要安全威胁:克隆、反向工程、篡改,从安全认证芯片、程序加解密与完整性验证、安全处理器3个方面,提出了针对嵌入式控制软件的保密设计策略及其安全性分析,设计了一种基于安全认证芯片、对称和非对称加密算法、安全密钥存储器的嵌入式控制软件保密应用解决方案,可实现对软件的机密性、完整性和抗否认性保护,为嵌入式控制软件保密性设计提供参考。 Security threats faced by embedded control software were analyzed: cloning, reverse engineering, and tampering. The embedded control software security design strategies and security analysis were presented from three aspects of security authentication chip, program encryption and decryption, integrity verification, and security processor. Finally, based on security authentication chip, symmetric and asymmetric encryption algorithm and embedded control softwarre for secure key memory, a security application solution was designed, which could protect the confidentiality, integrity and non-denied of the software. It has great reference value for the embedded controller design.
作者 戴计生 王成杰 李益 陈俊波 李程 DAI Jisheng;WANG Chengjie;LI Yi;CHEN Junbo;LI Cheng(Zhuzhou CRRC Times Electric Co.,Ltd.,Zhuzhou,Hunan 412001,China;CRRC ZIC Research Institute of Electrical Technology and Material Engineering,Zhuzhou,Hunan 412001,China)
出处 《机车电传动》 北大核心 2018年第5期56-60,共5页 Electric Drive for Locomotives
关键词 加密 安全认证 嵌入式控制软件 保密设计 eneryption security authentication embedded control software security design
  • 相关文献

参考文献3

二级参考文献8

  • 1Maureen Smerdon.用Spartan-3A和Spartan-3AN平台实现低成本安全解决方案[J].电子设计应用,2007(8):76-77. 被引量:1
  • 2Schneier B.Attack trees:Modeling security threats[].DrDobb’s journal.1999
  • 3Weingart S H.Physical Security Devices for Computer Subsystems:A Survey of Attacks and Defenses2008[R/OL]. http://www.atsec.com/downloads/pdf/phy_sec_dev.pdf . 2008
  • 4.Lockbox Secure Technology[R/OL][]..
  • 5Analog Devices Enables Secure and Robust Transmission of Remote Data for Smart Grids and Home and Building Automation[R/OL]. http://www.analog.com/en/press-release/5_27_09_ADI_Enables_Secure_Robust_Transmission/press.html . 2009
  • 6Schneier B.Secrets and Lies: Digital Security in a Networked World[]..2000
  • 7邓高明,赵强,张鹏,陈开颜.基于AES算法的Cache Hit旁路攻击[J].计算机工程,2008,34(13):113-114. 被引量:8
  • 8林浒,张荣茂.FPGA的设计与开发[J].小型微型计算机系统,1992,13(12):10-15. 被引量:4

共引文献11

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部