• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2021, Vol. 43 ›› Issue (08): 1353-1359.

• 高性能计算 • 上一篇    下一篇

微处理器内安全子系统的安全增强技术

石伟,刘威,龚锐,王蕾,张剑锋   

  1. (国防科技大学计算机学院,湖南 长沙 410073) 
  • 收稿日期:2020-08-08 修回日期:2021-03-01 接受日期:2021-08-25 出版日期:2021-08-25 发布日期:2021-08-24
  • 基金资助:
    核高基国家科技重大专项(2017ZX01028-103-002);科技部重点研发计划(2020AAA0104602,2018YFB2202603);国家自然科学基金(61832018)


Security enhancement technologies of security subsystem in microprocessors

SHI Wei,LIU Wei,GONG Rui,WANG Lei,ZHANG Jian-feng#br#

#br#
  

  1. (College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)
  • Received:2020-08-08 Revised:2021-03-01 Accepted:2021-08-25 Online:2021-08-25 Published:2021-08-24

摘要: 在信息技术快速发展的同时,信息安全变得尤为重要。处理器作为信息系统的核心部件,其安全性对系统安全起到至关重要的决定性作用。在处理器中构建安全可信的执行环境是提升处理器安全性的重要方法,然而很多核心安全技术仍然由片外安全TPM/TCM芯片保证。近年来,作为计算机系统安全基础的安全原点逐渐往处理器中转移。对处理器内安全子系统的安全增强技术展开研究,首先研究安全处理器体系结构;然后对处理器核、互连网络、存储和密码模块等处理器核心模块进行安全增强,同时从系统级角度实现了密钥管理、生命周期、安全启动和抗物理攻击等系统安全防护技术;最后,在一款桌面处理器中实现了一个安全子系统,并进行了分析。

关键词: 安全子系统, 随机行为, 密钥管理, 生命周期管理, 安全启动, 抗物理攻击

Abstract: With the rapid development of information technology, information security is becoming more and more important. As the core component of information system, the security of processor plays an important role in system security. Building a secure and trusted execution environment on the processor is an important method to improve the security of processor. However, many security technologies still rely on independent security chip, such as trusted platform module (TPM) and trusted cryptography module (TCM). In recent years, the root of security, which is the security basis of computer system, has gradually shifted to the processor. In this paper, the security enhancement technologies of on-chip security subsystem are discussed. Firstly, the architecture of the security processor is studied. Secondly, the components of the security subsystem such as processor core, interconnection network, storage, cipher module, are researched. At the same time, the system security protection technologies such as key management, life-cycle management, secure boot, and physical attack resistant schemes are also realized. Finally, a security subsystem for desktop processors is implemented and analyzed.


Key words: security subsystem, random behavior, key management, life-cycle management, secure boot, physical attack resistant