期刊文献+

面向物联网应用的SoC安全检查架构设计 被引量:2

Design of SoC Security Check Architecture for Internet of Things Applications
下载PDF
导出
摘要 物联网(IoT)应用的快速发展和软硬件开源化趋势使得IoT设备所面临的硬件安全威胁日益严峻,尤其是利用运行时条件触发的系统级攻击,很难通过传统测试方法进行检测和防御,需要提供运行时安全检查机制。分析IoT系统芯片面临的安全威胁,结合数据加密传输路径中的攻击、任务流和检查内容,设计4条功能完整性安全检查策略,搭建SoC安全策略检查架构并植入运行时触发硬件木马。仿真结果显示,运行时策略检查状态机可以检查出加密核、内存和UART接口的功能完整性问题,并通过发送错误中断信号进行反馈,证明了所设计的系统级安全策略检查架构的正确性与有效性。 The rapid development of Internet of Things(IoT)applications and the trend of open source software and hardware impose an increasingly acute hardware security threat on IoT devices.An especially serious threat is the systemlevel attacks triggered by runtime conditions,which are difficult to detect and defend by using traditional testing methods,and a runtime security check mechanism is required. This paper analyzes the security threats faced by IoT system chips. Based on the attacks,task flows and check content on the encrypted transmission paths for data,four security check policies for function integrity are designed.Then a SoC security policy check architecture is constructed,and triggered hardware trojans at runtime are embedded into it. Simulation results show that the state machine for runtime policy check can accurately check the functional integrity errors of the encryption core,memory and UART interface,and feedback by sending error interrupt signals.The results demonstrate the effectiveness and correctness of the designed system-level security policy check architecture.
作者 闫华钰 陈岚 佟鑫 李莹 YAN Huayu;CHEN Lan;TONG Xin;LI Ying(Institute of Microelectronics of Chinese Academy of Sciences,Beijing 100029,China;University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《计算机工程》 CAS CSCD 北大核心 2021年第2期152-159,共8页 Computer Engineering
基金 北京市科技专项(Z171100001117147)。
关键词 物联网 运行时检查 系统级安全检查 安全策略 安全架构 Internet of Things(IoT) runtime check system-level security check security policy security architecture
  • 相关文献

参考文献7

二级参考文献92

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2Luk C,Cohn R,Muth R.Pin:Building Customized Program Analysis Tools with Dynamic Instrumentation[C] //Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation.Chicago,USA:[s.n] ,2005.
  • 3StackShield V A Stack Smaching Technique Protection Tool for Linux[EB/OL].(2001-10-20).http://www.angelfire.con/sk/ stackshield/infor.htm.
  • 4Intel Unified Extensible Firmware Interface Specification:Version2.3.1[EB/OL].(2011-04-08).http://www.uefi.org/home/.
  • 5Unified EFI Forum.Unified Extensible Firmware InterfaceSpecification 2.3[EB/OL].(2009-05-20).http://www.uefi.org/specs/.
  • 6Intel Corporation.TCG EFI Platform Specification Version1.2[EB/OL].(2006-07-07).http://www.uefi.org/specs/.
  • 7DiskPart[EB/OL].[2011-07-22].http://technet.microsoft.com/zh-cn/library/cc773140(WS.10).aspx.
  • 8Intel Corporation.EFI 1.10 Driver Writer’s Guide Version1.10[EB/OL].(2004-07-15).http://developer.intel.com/technology/eif/.
  • 9罗宏伟.集成电路芯片安全隐患检测技术[J].半导体技术,2007,32(12):1094-1097. 被引量:5
  • 10李毅超,刘丹,韩宏,卢显良.缓冲区溢出漏洞研究与进展[J].计算机科学,2008,35(1):87-89. 被引量:11

共引文献23

同被引文献21

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部