集成电路与嵌入式系统2024,Vol.24Issue(9):1-6,6.DOI:10.20193/j.ices2097-4191.2024.0024
处理器可信执行区漏洞挖掘技术进展
Development of vulnerability mining techniques for processor trusted execution environments
摘要
Abstract
Trusted execution technology for processors is a viable solution for protecting sensitive information,providing a secure and iso-lated environment for sensitive information processing to ensure information security and privacy protection.However,trusted execution technology for processors faces threats from various attacks.To systematically understand the research on vulnerability exploration in processor trusted execution technology,this paper first introduces trusted execution technologies such as SEV in AMD,SGX in Intel and TrustZone in ARM.Then,the methods of vulnerability research under different processor platforms are introduced.Finally,this paper discusses the potential applications of trusted execution technology in the field of industrial control system,and forecasts its role in ensu-ring the security of industrial control systems and points out directions for future research.关键词
可信执行技术/漏洞挖掘/安全威胁/工业控制系统Key words
trusted execution technology/vulnerability mining/security threats/industrial control systems分类
信息技术与安全科学引用本文复制引用
姚文君,吕勇强,孙彦斌,吴国栋,田志宏..处理器可信执行区漏洞挖掘技术进展[J].集成电路与嵌入式系统,2024,24(9):1-6,6.基金项目
国家重点研发计划资助发展计划(2021YFB3101704) (2021YFB3101704)
国家自然科学基金面上项目(62372129,62272119、62072130、62372126) (62372129,62272119、62072130、62372126)
国家自然科学基金企业创新发展联合重点项目(U20B2046) (U20B2046)
国家重点研发计划(2021YFB2012402) (2021YFB2012402)
广东省高校和学院珠江学者资助计划(2019)-广东省基础与应用基础研究基金基金项目(2023A1515030142) (2019)
广州市基础与应用基础研究基金项目(SL2024A04J01406) (SL2024A04J01406)
PZL培育项目(PZL2022KF0013) (PZL2022KF0013)
广州大学项目(YJ2023047) (YJ2023047)
广州大学研究生创新能力培养项目(1112333014). (1112333014)