基于AMP模式多核处理器的可信节点构建方法OA北大核心CSTPCD
Method of trusted node implementation based on AMP mode multicore processor
针对多核处理器的安全性进行研究,深入探讨了微处理器技术的发展背景以及多核处理器在非对称多处理(AMP)模式下所面临的安全挑战.通过运用可信计算技术和双体系架构,结合AMP模式的工作特点以及多核之间的控制机制,提出一种主动免疫防御系统的策略和可信节点的构建方法,分析了可信计算在全工作过程中的度量机制,有效解决了多核处理器在AMP模式下的安全问题,同时很好地保持了核内原有系统的实时性.该方法不仅可以增强多核处理器的安全性,还能确保系统的可信运行环境,为未来计算设备的安全提供了坚实的支撑.通过对实验验证结果的分析,构建方案完全可行,能够在实际应用中推广.
The research was conducted on the security of multi-core processors,delving into the development background of microprocessor technology and the security challenges faced by multi-core processors in the AMP(asymmetric multiprocessing)mode.By utilizing trusted computing technology and dual architecture,combined with the working characteristics of AMP mode and the control mechanism between multi-cores,a strategy for active immune defense system and a method for constructing trusted nodes are proposed.The measurement mechanism of trusted computing throughout the entire working process is analyzed,effectively solving the security issues of multi-core processors in AMP mode while maintaining the real-time performance of the original system within the core.This method can not only enhance the security of multi-core processors,but also ensure a trusted operating environment for the system,providing solid support for the security of future computing devices.The analysis of experimental verification results prove that the construction plan is completely feasible and can be promoted in practical applications.
刘威鹏;郝俊芳;李跃鹏;李虎威
许继电气股份有限公司,河南 许昌 461000
电子信息工程
非对称多处理多核处理器可信节点可信计算技术双体系架构安全防护可信环境
asymmetric multiprocessingmulticore processorstrusted nodestrusted computing technologydual system architecturesafety protectiontrusted environment
《现代电子技术》 2024 (012)
37-44 / 8
中国电气装备集团有限公司科技项目(CEE-2022-C-01-01-003-XJ)
评论