【24h】

Hardware-Assisted Security: From PUF to SGX

机译:硬件辅助安全性:从PUF到SGX

获取原文

摘要

Protecting modem software with hardware-based security is becoming increasingly more important in practice. We are witnessing this trend through recent developments in the processor technology such as Intel's SGX and AMD's SEV. Moreover, veteran hardware-based security technologies such as Physically Unclonable Functions (PUFs), Trusted Platform Modules (TPM) and ARM's TrustZone are still evolving. However, all these solutions suffer from various shortcomings: they are afterthought and ad-hoc, require strong trust in manufacturers or their involvement, not accessible to third party developers, not scalable, or vulnerable to side-channel or runtime attacks. On the other hand, academic research has aimed at addressing some of these problems in the recent past by providing various security architectures such as AEGIS, Bastion, Sanctum, Sancus, TrustLite, TyTAN, to name some. Unfortunately, these solutions have not found their way into practice yet. This talk summarizes some of the recent hardware-assisted security technologies, discusses their strengths and deficiencies and future directions.
机译:使用基于硬件的安全性保护调制解调器软件在实践中变得越来越重要。我们正在通过Intel的SGX和AMD的SEV等处理器技术的最新发展目睹了这一趋势。此外,基于资深的基于硬件的安全技术,如物理上不可渗透的功能(PUF),可信平台模块(TPM)和ARM的TrustZone仍在不断发展。然而,所有这些解决方案都遭受了各种缺点:他们是追求的缺点和临时,需要对制造商或其参与的强烈信任,而不是第三方开发人员无法扩展,或者容易受到侧频道或运行时攻击。另一方面,学术研究旨在通过提供各种安全架构,例如Aegis,Bastion,Sanctum,Sancus,Trustlite,Tytan,命名一些安全架构,以解决最近过去的一些问题。不幸的是,这些解决方案还没有找到他们的练习。这次谈判总结了最近的一些硬件辅助安全技术,讨论了他们的优势和缺陷和未来的方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号