• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2021, Vol. 43 ›› Issue (08): 1353-1359.

Previous Articles     Next Articles

Security enhancement technologies of security subsystem in microprocessors

SHI Wei,LIU Wei,GONG Rui,WANG Lei,ZHANG Jian-feng#br#

#br#
  

  1. (College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)
  • Received:2020-08-08 Revised:2021-03-01 Accepted:2021-08-25 Online:2021-08-25 Published:2021-08-24

Abstract: With the rapid development of information technology, information security is becoming more and more important. As the core component of information system, the security of processor plays an important role in system security. Building a secure and trusted execution environment on the processor is an important method to improve the security of processor. However, many security technologies still rely on independent security chip, such as trusted platform module (TPM) and trusted cryptography module (TCM). In recent years, the root of security, which is the security basis of computer system, has gradually shifted to the processor. In this paper, the security enhancement technologies of on-chip security subsystem are discussed. Firstly, the architecture of the security processor is studied. Secondly, the components of the security subsystem such as processor core, interconnection network, storage, cipher module, are researched. At the same time, the system security protection technologies such as key management, life-cycle management, secure boot, and physical attack resistant schemes are also realized. Finally, a security subsystem for desktop processors is implemented and analyzed.


Key words: security subsystem, random behavior, key management, life-cycle management, secure boot, physical attack resistant