【24h】

Securing Trusted Execution Environments with PUF Generated Secret Keys

机译:使用PUF生成的密钥保护受信任的执行环境

获取原文
获取原文并翻译 | 示例

摘要

Trusted Execution Environments are quickly becoming a preferred method for providing isolation between secure and non-secure execution environments. The protection of these environments, as well as their software structure, is still a primary area of interest and research. The abililty to use a Physically Unclonable Function to generate a unique-per-device AES key provides an excellent mechanism for protection of a Trusted Execution Environment at rest through encryption. These keys can also be used to manage modification of the TEE during execution. In this paper, we present an new methodology for how this protection can be achieved, as well as a framework for the incorporation of Physically Unclonable Functions into cryptographic engines.
机译:可信执行环境正迅速成为在安全和非安全执行环境之间提供隔离的首选方法。对这些环境及其软件结构的保护仍然是人们关注和研究的主要领域。使用物理上不可克隆的功能来生成每个设备唯一的AES密钥的能力为通过加密保护静止的受信任执行环境提供了一种极好的机制。这些密钥还可用于在执行期间管理TEE的修改。在本文中,我们提出了一种新的方法来实现这种保护,以及将物理上不可克隆的功能合并到加密引擎中的框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号