首页> 外文会议>Proceedings of the 4th ACM international workshop on Contents protection and security >Cell Broadband Engine? processor security architecture and digital content protection
【24h】

Cell Broadband Engine? processor security architecture and digital content protection

机译:蜂窝宽带引擎?处理器安全架构和数字内容保护

获取原文
获取原文并翻译 | 示例

摘要

Current content protection technologies such as those based on broadcast encryption and public-key encryption focus on the distribution and control of content. Although these technologies are effective and mathematically sound, they are susceptible to systematic attacks that utilize any underlying platform weakness, bypassing the cryptographic strengths of the actual schemes. Thus, ensuring that the computing platform supports the cryptographic content protection layers on top is a critical issue. In this light, the Cell Broadband Engine (Cell BE) processor [1] security architecture has three core features that are well-suited for this purpose. First, it provides a hardware-enforced memory isolation whereby code and data are robustly protected during code execution. Unlike competing security solutions, this design is unique in that even if the supervisory software such as the operating system or the hypervisor is compromised, the memory isolation is guaranteed. In contrast, most security architectures rely on the perpetual integrity and security of its supervisory software to protect and separate the processes. Second, the Cell BE architecture provides the ability to do a hardware supported authentication of the software stack (i.e. "secure boot") during runtime. Many security architectures do a secure boot only at boot time with the assumption that if the software's integrity is verified at time 0, it can be trusted forever afterwards. However, many security attacks such as those that are software-based, compromise the software stack during runtime. The Cell BE protects against this by offering a runtime secure boot feature so that the software stack can be constantly re-verified. Third, the architecture provides a hardware key to act as the root of an encryption chain. Data encrypted by this key directly or indirectly can only be decrypted and provided to an application that is running in the isolated memory (the first feature) and has been verified (via the second feature). This significantly limits an adversary's chances of manipulating software to expose the keys fundamental to a content protection scheme.
机译:当前的内容保护技术,例如基于广播加密和公钥加密的内容保护技术,侧重于内容的分发和控制。尽管这些技术有效且在数学上是可靠的,但它们容易受到利用任何潜在平台弱点的系统攻击的影响,从而绕过了实际方案的加密优势。因此,确保计算平台在顶部支持密码内容保护层是一个关键问题。因此,信元宽带引擎(Cell BE)处理器[1]的安全体系结构具有三个非常适合此目的的核心功能。首先,它提供了硬件强制的内存隔离,从而在代码执行期间对代码和数据提供了有力的保护。与竞争性安全解决方案不同,该设计的独特之处在于,即使诸如操作系统或管理程序之类的管理软件受到损害,也可以确保内存隔离。相比之下,大多数安全体系结构都依靠其管理软件的永久完整性和安全性来保护和分离流程。其次,Cell BE体系结构提供了在运行时对软件堆栈进行硬件支持的身份验证(即“安全启动”)的能力。许多安全体系结构仅在启动时执行安全启动,并假设如果在时间0验证了软件的完整性,则此后可以永远信任它。但是,许多安全攻击(例如基于软件的攻击)会在运行时损害软件堆栈。 Cell BE通过提供运行时安全启动功能来防止这种情况的发生,以便可以不断重新验证软件堆栈。第三,该体系结构提供了充当加密链根的硬件密钥。使用此密钥直接或间接加密的数据只能被解密并提供给在隔离内存中运行的应用程序(第一个功能),并已通过第二个功能进行了验证。这极大地限制了对手操纵软件公开内容保护方案所必需的密钥的机会。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号