检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:庞飞[1] 唐六华[1] 谢小赋[1] 孙夏声[1] PANG Fei;TANG Liuhua;XIE Xiaofu;SUN Xiasheng(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041
出 处:《信息安全与通信保密》2022年第6期102-110,共9页Information Security and Communications Privacy
摘 要:针对安全模块扩展技术面临的安全风险以及性能较低的问题,提出了一种基于TrustZone技术构建内生可信执行环境的方法。重点研究了计算资源隔离分配、固件可信度量、安全存储、全信任链构建等关键技术。设计了内生可信执行环境系统结构与可信计算基关键部件,通过对其安全性进行分析,表明基于内生可信执行环境,可以从底层硬件到上层软件,逐级构建自启动到运行整个活动周期的信任链,能够有效地保证系统关键硬件、固件、操作系统文件、应用软件和敏感数据的安全性和完整性,具备内生安全、易扩展、低成本等优点。To address the security risks and low performance of security module extension,this paper proposes a method to build an endogenous trusted execution environment based on TrustZone,and focuses on the key technologies such as computing resource isolation allocation,firmware trust metric,secure storage,and full trust chain transfer.It designs the system architecture of the endogenous trusted execution environment and the key components of the trusted computing base.Through the analysis of the system security,it is shown that based on the endogenous trusted execution environment,the trust chain from the bottom hardware to the top software can be built step by step from startup to operation of the entire activity cycle.The system can effectively ensure the security and integrity of key hardware,firmware,operating system files,application software and sensitive data,with the endogenous security,easy expansion,low cost and so on.
分 类 号:TP309.1[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.15.31.125