期刊文献+

基于TrustZone技术的微处理器芯片架构 被引量:6

Microcontroller chip architecture based on TrustZone technology
下载PDF
导出
摘要 安全是物联网发展面临的最大问题之一,对物联网设备的安全攻击包括通信攻击、物理攻击、软件攻击等多种方式。针对物联网面临的软件攻击威胁,ARM在V8M架构中引入Trustzone技术,使M系列架构的处理器支持TrustZone技术,实现了硬件层次对抗软件攻击的手段。由于M系列微处理器芯片和A系列应用处理器面向的应用不同,ARM V8M架构的TrustZone下和A系列的TrustZone技术存在区别。本文介绍ARM V8M架构芯片总线结构以及数据通路,做为基于ARM V8M TrustZone技术的芯片设计参考。基于ARM V8M TrustZone技术的微处理器芯片架构,芯片中的存储空间分为安全域和非安全域两部分,用IDAU和SAU定义Master发出地址的安全属性,用MPC、PPC等组件保护存储数据和外设资源不被非法访问,实现安全域和非安全域的硬件隔离保护。 Security is one of the biggest problems that hinder the development of the IoT.Security attacks on the IoT device include communication attacks,physical attacks,and software attacks.In response to the software attack threats faced by the IoT,ARM introduced TrustZone technology to the V8M architecture,enabling the M-series processors to support TrustZone technology and implement hardware level countermeasures against software attacks.Due to the different applications of the M-series microcontroller and the A-series application processor,there is a difference between the TrustZone of the ARM V8M architecture and ARM V8A.This paper introduces the microcontroller chip structure and data path,as a chip design reference based on ARM V8M TrustZone technology.In the microcontroller chip architecture of ARM V8M TrustZone technology,the storage space of the chip is divided into two parts:security domain and non-security domain.IDAU and SAU are used to define the security attributes of the address issued by the master,and the storage data and peripheral is protected by components such as MPC and PPC to avoid illegally access,enabling hardware isolation protection for secure domains and non-secure domains.
作者 刘亮 陈震 LIU Liang;CHEN Zhen(State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology,Beijing Smart-Chip Microelectronics Technology Co.,Ltd.,Beijing 100192,China)
出处 《电子设计工程》 2020年第2期189-193,共5页 Electronic Design Engineering
关键词 ARMV8M TRUSTZONE 微处理器 物联网 安全 ARMV8M TrustZone microcontroller IoT security
  • 相关文献

参考文献10

二级参考文献100

  • 1ARM Company. TrustZone. Security Foundation by ARM..[EB/OL] .http : //www.arm.com/zh/products/processors/technologies/trustzone.php.
  • 2TOM R., HALFHILL. TrustZone Security ExtensionsStrengthen ARMv6 Architecture[EB/OL].http : //www.arm.com/miscPDFs/4136.pdf, 2004.
  • 3Bejtlich R. Understanding the advanced persistent threat[EB/OL]. [ 2015-06-15]. http://searchsecurity, techtarget. com. html.
  • 4Krebs B. Crimepack: Packed with hard lessons [EB/OL]. [2015-06-15]. http://krebsonsecurity, com/2010/081crimepack- packedwit h-hard-lessons.
  • 5Bitg+Carbon Black. The bit9 security platformv7 [EB/OL]. [2015-06-15]. https://www, bitg. eomldownload]data-sheets] Bit9-Securit y-Plat formvT, pdf.
  • 6Shaffer R. Raising the white flag: Bypassing application whitelisting [EB/OL]. [2015-06-15]. http://foregroundsecurity. com/rcsources/blog.
  • 7Cristoph H. Bypassing PatchGuard 3 [EB/OL]. [2015-06- 15]. http://www, codeproiect, comlArticles128318/Bypassing- PatchGuard.
  • 8Saile R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture [C] //Proe of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.
  • 9ARM. Building a secure system using TrustZone [EB/OL]. [2015-06-15]. http://www, arm. com.
  • 10Petroni N L, Fraser T, Molina J, et al. Copilota coprocessor-based kernel runtime integrity monitor [C] // Proc of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.

共引文献68

同被引文献47

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部