首页> 外文会议>International Conference on Availability, Reliability and Security >Physically Secure Code and Data Storage in Autonomously Booting Systems
【24h】

Physically Secure Code and Data Storage in Autonomously Booting Systems

机译:在自主引导系统中物理安全的代码和数据存储

获取原文
获取外文期刊封面目录资料

摘要

Today, full disk encryption is a common practice to protect data on desktop computers and notebooks from unauthorized physical access. For embedded systems, however, the situation is different and they often lack physical protection. Usually no user or remotely connected system is involved during the boot phase which requires autonomously booting systems. For this paper an entire software stack for secure code and data storage in embedded systems has been designed, implemented and evaluated regarding security aspects and performance. For the security evaluation, physical attacks on the flash chip and RAM access have been taken into account. The system is a combined hardware and software solution and provides a considerable amount of security without a second party involved that could participate in a trust bootstrapping protocol. A symmetric key hierarchy enables the use of applications from different vendors which are not able to decrypt each others software. For code, a signature chain ensures the authenticity of the code being run. For data, integrity is ensured on a per sector basis such that targeted manipulations are not only mitigated but can be detected as well. This is a novel technique that is currently not known from any publicly available full disk encryption system. We show that the confidentiality, integrity and authenticity of code and data protected with our system can be ensured provided that small parts of the hardware are considered trusted.
机译:今天,全磁盘加密是一种常见的做法,可以保护桌面计算机和笔记本电脑上的数据免受未经授权的物理访问。然而,对于嵌入式系统,情况不同,它们通常缺乏物理保护。通常在引导阶段期间没有涉及用户或远程连接的系统,这需要自主引导系统。对于本文,在安全方面和性能方面已经设计了一个用于安全码和嵌入式系统中数据存储的整个软件堆栈。对于安全评估,已经考虑了对闪存芯片和RAM访问的物理攻击。该系统是组合的硬件和软件解决方案,在没有涉及的第二方可以参与信任引导协议的情况下提供相当大量的安全性。对称密钥层次结构使得能够使用不同供应商的应用程序,这些供应商无法解密彼此软件。对于代码,签名链可确保正在运行的代码的真实性。对于数据,每个扇区基础确保完整性,使得目标操纵不仅可以减轻而且可以检测到。这是一种新颖的技术,目前无法从任何公开的全磁盘加密系统中知道。我们展示了通过我们系统保护的代码和数据的机密性,完整性和真实性,只要认为硬件的小部分被认为是可信的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号