Computer Engineering & Science ›› 2022, Vol. 44 ›› Issue (03): 417-426.
• Computer Network and Znformation Security • Previous Articles Next Articles
CHEN Xiang-guo,SHANG Fan,SONG Jun-qiang
Received:
Revised:
Accepted:
Online:
Published:
Abstract: Due to the development of Internet of Things technology, the security protection of embedded systems has become a systemic problem that needs to be considered and tried to be solved urgently. A variety of embedded computer system security protection methods are compared, and ARM TrustZone security protection scheme is analyzed. The main differences between the two technologies (TrustZone-A and TrustZone-M) are analyzed, and the applicable scenarios and implementation characteristics of the two solutions are given. The implementation principle of the trusted startup process based on TrustZone technology is described, and the feasibility of the implementation of abnormal program detection based on the TrustZone-A monitoring mode code is discussed. Finally, combined with typical application scenarios, a security protection scheme based on TrustZone-M technology and an implementation example of a security communication protocol are designed and proposed.
Key words: embedded system, security protection, virtualization technology, TrustZone
CHEN Xiang-guo, SHANG Fan, SONG Jun-qiang. Comparison among embedded system security protection schemes and their application case analysis[J]. Computer Engineering & Science, 2022, 44(03): 417-426.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2022/V44/I03/417