作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (2): 152-159. doi: 10.19678/j.issn.1000-3428.0057460

• 网络空间安全 • 上一篇    下一篇

面向物联网应用的SoC安全检查架构设计

闫华钰1,2, 陈岚1, 佟鑫1, 李莹1   

  1. 1. 中国科学院微电子研究所, 北京 100029;
    2. 中国科学院大学, 北京 100049
  • 收稿日期:2020-02-21 修回日期:2020-04-07 出版日期:2021-02-15 发布日期:2021-01-29
  • 作者简介:闫华钰(1994-),男,硕士研究生,主研方向为集成电路硬件安全;陈岚(通信作者),研究员、博士;佟鑫,助理研究员、硕士;李莹,副研究员、博士。
  • 基金资助:
    北京市科技专项(Z171100001117147)。

Design of SoC Security Check Architecture for Internet of Things Applications

YAN Huayu1,2, CHEN Lan1, TONG Xin1, LI Ying1   

  1. 1. Institute of Microelectronics of Chinese Academy of Sciences, Beijing 100029, China;
    2. University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2020-02-21 Revised:2020-04-07 Online:2021-02-15 Published:2021-01-29

摘要: 物联网(IoT)应用的快速发展和软硬件开源化趋势使得IoT设备所面临的硬件安全威胁日益严峻,尤其是利用运行时条件触发的系统级攻击,很难通过传统测试方法进行检测和防御,需要提供运行时安全检查机制。分析IoT系统芯片面临的安全威胁,结合数据加密传输路径中的攻击、任务流和检查内容,设计4条功能完整性安全检查策略,搭建SoC安全策略检查架构并植入运行时触发硬件木马。仿真结果显示,运行时策略检查状态机可以检查出加密核、内存和UART接口的功能完整性问题,并通过发送错误中断信号进行反馈,证明了所设计的系统级安全策略检查架构的正确性与有效性。

关键词: 物联网, 运行时检查, 系统级安全检查, 安全策略, 安全架构

Abstract: The rapid development of Internet of Things(IoT) applications and the trend of open source software and hardware impose an increasingly acute hardware security threat on IoT devices.An especially serious threat is the system-level attacks triggered by runtime conditions,which are difficult to detect and defend by using traditional testing methods,and a runtime security check mechanism is required.This paper analyzes the security threats faced by IoT system chips.Based on the attacks,task flows and check content on the encrypted transmission paths for data,four security check policies for function integrity are designed.Then a SoC security policy check architecture is constructed,and triggered hardware trojans at runtime are embedded into it.Simulation results show that the state machine for runtime policy check can accurately check the functional integrity errors of the encryption core,memory and UART interface,and feedback by sending error interrupt signals.The results demonstrate the effectiveness and correctness of the designed system-level security policy check architecture.

Key words: Internet of Things(IoT), runtime check, system-level security check, security policy, security architecture

中图分类号: