|国家科技期刊平台
首页|期刊导航|集成电路与嵌入式系统|处理器可信执行区漏洞挖掘技术进展

处理器可信执行区漏洞挖掘技术进展OACSTPCD

Development of vulnerability mining techniques for processor trusted execution environments

中文摘要英文摘要

处理器可信执行技术是解决敏感信息保护的一种可行方案,通过对敏感信息程序提供一个安全的隔离运行环境,实现信息安全和隐私保护.然而,处理器的可信执行技术面临着攻击的威胁.为了让研究人员系统地了解处理器可信执行技术漏洞挖掘研究,首先介绍AMD SEV、Intel SGX、ARM TrustZone等可信执行技术;接着详细阐述不同处理器平台下的可信执行技术漏洞挖掘研究方法;最后展望了处理器可信执行技术在工业控制领域的潜在应用,并指出研究的发展方向.

Trusted execution technology for processors is a viable solution for protecting sensitive information,providing a secure and iso-lated environment for sensitive information processing to ensure information security and privacy protection.However,trusted execution technology for processors faces threats from various attacks.To systematically understand the research on vulnerability exploration in processor trusted execution technology,this paper first introduces trusted execution technologies such as SEV in AMD,SGX in Intel and TrustZone in ARM.Then,the methods of vulnerability research under different processor platforms are introduced.Finally,this paper discusses the potential applications of trusted execution technology in the field of industrial control system,and forecasts its role in ensu-ring the security of industrial control systems and points out directions for future research.

姚文君;吕勇强;孙彦斌;吴国栋;田志宏

广州大学网络空间安全学院,广州 510006清华大学北京信息科学与技术国家研究中心,北京 100084

计算机与自动化

可信执行技术漏洞挖掘安全威胁工业控制系统

trusted execution technologyvulnerability miningsecurity threatsindustrial control systems

《集成电路与嵌入式系统》 2024 (009)

1-6 / 6

国家重点研发计划资助发展计划(2021YFB3101704);国家自然科学基金面上项目(62372129,62272119、62072130、62372126);国家自然科学基金企业创新发展联合重点项目(U20B2046);国家重点研发计划(2021YFB2012402);广东省高校和学院珠江学者资助计划(2019)-广东省基础与应用基础研究基金基金项目(2023A1515030142);广州市基础与应用基础研究基金项目(SL2024A04J01406);PZL培育项目(PZL2022KF0013);广州大学项目(YJ2023047);广州大学研究生创新能力培养项目(1112333014).

10.20193/j.ices2097-4191.2024.0024

评论