期刊文献+

一种嵌入式设备固件安全更新方案

A Firmware Security Update Scheme for Embedded Devices
下载PDF
导出
摘要 针对嵌入式设备固件更新的安全问题,文中提出了一种基于哈希、对称、非对称加密算法的多重校验固件安全更新方案。通过主密钥对、临时密钥对、共享密钥以及哈希链等设计,从身份认证、数据加密、完整性校验等多个方面对固件更新进行安全防护,可以有效预防非法用户、固件篡改、固件数据泄露、重放攻击、固件回滚等攻击。文中对此安全更新方案进行了具体实现,实验结果显示该方案相较于无任何安全防护的ISP(In System Programming)和IAP(In Application Pragramming)技术,在时间成本方面分别增加约7%和11%的情况下实现了对固件更新的全流程安全防护,为嵌入式设备的固件更新提供了一种安全、可靠的更新方法。 In view of the security problem of embedded device firmware update,this study proposes a multi-check firmware security update scheme based on hash,symmetric and asymmetric encryption algorithms.In this study,the master key pairs,temporary key pairs,shared key and hash chain are designed to protect firmware update from identity authentication,data encryption,integrity check and other aspects,which can effectively prevent illegal users,firmware tampering,firmware data leakage,replay attack,firmware rollback and other attacks.In this study,the concrete implementation of the security update scheme is carried out.The experiment results show that compared with the ISP(In System Programming)and IAP(In Application Pragramming)technologies without any security protection,the scheme achieves the security protection of the whole process of firmware update at the time cost of about 7%and 11%,it provides a safe and reliable update method for embedded device firmware update.
作者 曾祥义 刘伟 肖昊 ZENG Xiangyi;LIU Wei;XIAO Hao(School of Microelectronics,Hefei University of Technology,Hefei 230009,China)
出处 《电子科技》 2023年第8期14-18,64,共6页 Electronic Science and Technology
基金 国家自然科学基金(61974039) 航空科学基金(2018ZCP4003)。
关键词 固件更新 固件安全 嵌入式系统 身份认证 数字签名 哈希链 完整性校验 对称加密 firmware update firmware security embedded system identity authentication digital signature Hash chain integrity checking symmetric encryption
  • 相关文献

参考文献8

二级参考文献65

  • 1陈波.域名系统DNS的安全防护技术分析[J].电子技术(上海),2020(6):80-81. 被引量:1
  • 2尹震宇,赵海,孙佩刚,林恺,罗玎玎.一种并行数据输入的循环冗余校验码算法设计[J].计算机工程与应用,2006,42(27):1-2. 被引量:3
  • 3Gao H, Li Q, Zhu Y. Research on the working mechanism of Bootkit[ C] //Sth International Conference on Information Science and Digital Content Technology. IEEE, 2012: 476-479.
  • 4Cooper D, Polk W, Regenscheid A, et al. BIOS protection guidelines [J]. NIST Special Publication, 2011, 800: 147.
  • 5Li X, Wen Y, Huang M H, et al. An overview of Bootkit at- tacking approaches [C] //Seventh International Conference onMobile Ad-boc and Sensor Networks. IEEE, 2011: 428-431.
  • 6BH13US Workshop. Embedded devices security and firmware reverse engineering [C] //BLACKHAT, 2013.
  • 7Bellard F. Qemu: Open source processor emulator [EB/OL]. http://savannah, nongnu, org/projects/qemu,2009.
  • 8Yiu J. The definitive guide to the ARM Cortex-M3[M]. Ac- cess Online via Elsevier, 2009.
  • 9Lee D, Won Y. Booting Linux faster [C] //3rd IEEE Inter- national Conference on Network Infrastructure and Digital Content. IEEE, 2012: 665-668.
  • 10周雷,梁昊,虞孝麒,周永钊.基于串行存储器的FPGA在线高速重载[J].核电子学与探测技术,2008,28(3):593-595. 被引量:2

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部