• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science

Previous Articles     Next Articles

Secure checkpointing on non-volatile processors
 

LIU Zimo,QIU Zongdi,JIA Tianyuan,XU Yuanchao   

  1. (College of Information Engineering,Capital Normal University,Beijing 100048,China)
  • Received:2018-08-27 Revised:2018-10-20 Online:2019-01-25 Published:2019-01-25

Abstract:

Non-volatile processors (NVPs) can be quickly restored in an energy harvesting environment and are ideal for applications such as internet of things. Checkpointing is the core safeguard technology of NVPs. However, existing backup strategies assume that NVPs work in an ideal working environment, which only consider factors such as unstable energy input, but not the impact of outside malicious attacks on the security of NVPs. For example, the attackers tamper the contents of registers during backup process, which makes the system run away; or they tamper the contents written to non-volatile storage during backup process, making the data untrustworthy. These attacks hinder the application of NVPs in safetycritical areas such as wearable medical equipment. We sort out the latest security threats during the backup process of NVPs with retention state, and propose corresponding coping mechanisms.

Key words: non-volatile processor, secure checkpointing, energy harvesting;internet of things