作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2022, Vol. 48 ›› Issue (2): 132-139. doi: 10.19678/j.issn.1000-3428.0060881

• 网络空间安全 • 上一篇    下一篇

抗板级物理攻击的持久存储方法研究

李闽1, 张倩颖1,2,3, 王国辉1,2, 施智平1,4, 关永1,5   

  1. 1. 首都师范大学 信息工程学院, 北京 100048;
    2. 高可靠嵌入式系统北京市工程研究中心, 北京 100048;
    3. 中国科学院计算技术研究所 计算机体系结构国家重点实验室, 北京 100190;
    4. 电子系统可靠性技术北京市重点实验室, 北京 100048;
    5. 北京成像理论与技术高精尖创新中心, 北京 100048
  • 收稿日期:2021-02-18 修回日期:2021-04-27 发布日期:2021-05-24
  • 作者简介:李闽(1993-),男,硕士研究生,主研方向为嵌入式操作系统安全;张倩颖(通信作者),副教授;王国辉,高级实验师;施智平、关永,教授、博士生导师。
  • 基金资助:
    国家自然科学基金(61802375,61602325,61876111,61877040);北京市教委科技计划一般项目(KM201910028005);中国科学院计算技术研究所计算机体系结构国家重点实验室开放课题(CARCH201920);首都师范大学交叉科学研究院项目(19530012005)。

Research on Persistent Storage Method Against Board-Level Physical Attacks

LI Min1, ZHANG Qianying1,2,3, WANG Guohui1,2, SHI Zhiping1,4, GUAN Yong1,5   

  1. 1. College of Information Engineering, Capital Normal University, Beijing 100048, China;
    2. Beijing Engineering Research Center of High Reliable Embedded System, Beijing 100048, China;
    3. State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China;
    4. Beijing Key Laboratory of Electronic System Reliability Technology, Beijing 100048, China;
    5. Beijing Advanced Innovation Center for Imaging Theory and Technology, Beijing 100048, China
  • Received:2021-02-18 Revised:2021-04-27 Published:2021-05-24

摘要: 为保护文件系统的安全性,提出一种抗板级物理攻击的持久存储方法。利用ARM TrustZone技术构建持久存储架构,实现内存保护机制和持久存储保护服务,提高文件系统的物理安全性。基于片上内存(OCM)在可信执行环境(TEE)中的内核层建立内存保护机制,保证TEE的可信应用能够抵抗板级物理攻击。基于TEE的内存保护机制实现保护文件系统中敏感数据的持久存储保护服务,确保文件系统的机密性和完整性。在物理开发板上实现持久存储架构的原型系统,使用基准测试工具对原型系统进行性能评估,并分析性能损耗的原因。测试结果表明,内存保护机制在保护TEE系统物理安全性时引入的时间开销会随着OCM的增大而减小,持久存储保护服务在保护数据量较小的敏感数据时产生的时间开销在用户可接受范围内。

关键词: ARM TrustZone技术, 可信执行环境, 板级物理攻击, 片上内存, 持久存储保护

Abstract: In order to protect the security of the file system, this paper presents a persistent storage method against board-level physical attacks.Utilizing the ARM TrustZone technology, we build a persistent storage architecture that provides a memory protection mechanism and a persistent storage protection service and improves the physical security of the file system.Based on On-Chip Memory(OCM), a memory protection mechanism is built at the kernel level of the Trusted Execution Environment(TEE), and it ensures that trusted applications of TEE can resist board-level physical attacks.Based on the above memory protection mechanism of TEE, a persistent storage protection service is realized for protecting sensitive data in file systems, which can provide confidentiality and integrity protection to the file system.Finally, we implement a prototype system on a physical development board, use benchmark test tools to evaluate its performance, and analyze the cause for its overhead.The test results show that the overhead introduced by the memory protection mechanism in protecting the physical security of the TEE system decreases with the increase of the OCM, and the overhead of the persistent storage protection service when protecting a small amount of sensitive data is within the acceptable range of users.

Key words: ARM TrustZone technology, Trusted Execution Environment(TEE), board-level physical attack, On-Chip Memory(OCM), persistent storage protection

中图分类号: