• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 高性能计算 • 上一篇    下一篇

非易失处理器安全备份机制研究

刘橴默,邱宗迪,贾甜远,徐远超   

  1. (首都师范大学信息工程学院,北京 100048)
  • 收稿日期:2018-08-27 修回日期:2018-10-20 出版日期:2019-01-25 发布日期:2019-01-25
  • 基金资助:

    计算机体系结构国家重点实验室开放课题(CARCH201503);国家留学基金委资助

Secure checkpointing on non-volatile processors
 

LIU Zimo,QIU Zongdi,JIA Tianyuan,XU Yuanchao   

  1. (College of Information Engineering,Capital Normal University,Beijing 100048,China)
  • Received:2018-08-27 Revised:2018-10-20 Online:2019-01-25 Published:2019-01-25

摘要:

非易失处理器NVP可以在自供能环境下快速恢复,非常适合物联网等应用环境。备份(Checkpointing)是NVP的核心保障技术。然而,现有的备份策略假设NVP处于理想的工作环境,只考虑了能量输入不稳等因素,没有考虑外界的恶意攻击对NVP安全带来的影响,比如,外界篡改备份过程中寄存器的内容,使系统崩溃;篡改备份过程中写到非易失存储中的内容,使数据不可信等,阻碍了NVP在可穿戴医疗设备等安全攸关领域中的应用。梳理了最新的带维持态的NVP在备份过程中存在的安全威胁,并提出了相应的应对机制。

 

关键词: 非易失处理器, 安全备份, 自供能, 物联网

Abstract:

Non-volatile processors (NVPs) can be quickly restored in an energy harvesting environment and are ideal for applications such as internet of things. Checkpointing is the core safeguard technology of NVPs. However, existing backup strategies assume that NVPs work in an ideal working environment, which only consider factors such as unstable energy input, but not the impact of outside malicious attacks on the security of NVPs. For example, the attackers tamper the contents of registers during backup process, which makes the system run away; or they tamper the contents written to non-volatile storage during backup process, making the data untrustworthy. These attacks hinder the application of NVPs in safetycritical areas such as wearable medical equipment. We sort out the latest security threats during the backup process of NVPs with retention state, and propose corresponding coping mechanisms.

Key words: non-volatile processor, secure checkpointing, energy harvesting;internet of things