可信执行环境的RISC-V架构处理器安全分区方法

王健, 付志博, 明哲

集成电路与嵌入式系统 ›› 2023, Vol. 23 ›› Issue (9) : 16-19.

PDF(1328 KB)
PDF(1328 KB)
集成电路与嵌入式系统 ›› 2023, Vol. 23 ›› Issue (9) : 16-19.
专题论述

可信执行环境的RISC-V架构处理器安全分区方法

  • 王健1,2, 付志博1,2, 明哲1,2
作者信息 +

RISC-V Architecture Processor Security Partitioning Method Based on Trusted Execution Environment

  • Wang Jian1,2, Fu Zhibo1,2, Ming Zhe1,2
Author information +
文章历史 +

摘要

RISC-V架构处理器分区过程中,因未处于可信执行环境中,使得部分分区内容出现了新行内容随意替换旧行内容的问题,导致分区结果重叠部分较多。为此,提出基于可信执行环境的RISC-V架构处理器安全分区方法。根据请求指令中的虚拟机ID编号将虚拟机与虚拟根实例进行绑定,为RISC-V架构处理器中的划分提供安全环境。将安全内存加密引擎集成到内部的 Cache与存储控制器间,生成单次分块区。利用多用户端密钥对称算法获取访问密文,采用蒙特卡罗法计算当前分区解向量对应的偏移时间。根据该偏移时间序列,采用Cache方法进行分区可信通道物理页着色处理,可避免出现新行随意替换旧行的问题,获取安全的分区结果。由实验结果可知,使用本研究方法分区命中率最小值可达到0.82,能够达到理想的分区效果。

Abstract

During the partitioning process of the RISC-V architecture processor,it is not in a trusted security environment,which causes the problem of the new row content replacing the old row content at will in some partition content,resulting in more overlapping parts of partition results.Therefore,a secure partitioning method for RISC-V architecture processors based on trusted execution environment is proposed.According to the virtual machine ID number in the request instruction,the virtual machine is bound to the virtual root instance to provide a secure environment for the security division in the RISC-V architecture processor.Integrate the secure memory encryption engine between the internal cache and the storage controller to generate single-shot chunks.The multi-user key symmetry algorithm is used to obtain the access ciphertext,and the Monte Carlo method is used to calculate the offset time corresponding to the current partition solution vector.According to the offset time series,the Cache method is used to color the physical pages of the partitioned trusted channel to avoid the problem of replacing old rows with new rows and obtain safe partitioning results.It can be seen from the experimental results that the minimum value of partition hit rate can reach 0.82 using the research method,which can achieve the ideal partition effect.

关键词

可信执行环境 / RISC-V架构 / 安全分区

Key words

trusted execution environment / RISC-V architecture / security partition

引用本文

导出引用
王健, 付志博, 明哲. 可信执行环境的RISC-V架构处理器安全分区方法[J]. 集成电路与嵌入式系统. 2023, 23(9): 16-19
Wang Jian, Fu Zhibo, Ming Zhe. RISC-V Architecture Processor Security Partitioning Method Based on Trusted Execution Environment[J]. Integrated Circuits and Embedded Systems. 2023, 23(9): 16-19
中图分类号: TP301   

参考文献

[1] 高启明,吴莉莉.基于最优虚拟截止日期多处理器混合时序调度[J].计算机工程与设计,2021,42(5):1376-1382.
[2] 梁秋玲,张向利,张红梅,等.基于多核处理器的关联任务并行感知调度算法[J].计算机工程,2021,47(7):212-217.
[3] 成元虎,黄立波,崔益俊,等.基于RISC-V的嵌入式多指令集处理器设计及实现[J].电子学报,2021,49(11):2081-2089.
[4] 牛世权.轻量级安全内存:RISC-V嵌入式微处理器安全增强[J].计算机工程与科学,2021,43(8):1360-1365.
[5] 娄冕,张海金,杨靓,等.基于Chisel语言的RISC-V处理器设计技术[J].微电子学与计算机,2021,38(3):51-55.
[6] 徐子晨,崔傲,王玉皞,等.基于RISC-V架构的强化学习容器化方法研究[J].计算机工程与科学,2021,43(2):266-273.
[7] 刘有耀,潘宇晨.基于RISC-V参数化超标量处理器的优化设计[J].计算机工程与应用,2022,58(5):66-74.
[8] 孙彩霞,郑重,邓全,等.DMR:兼容RISC-V架构的乱序超标量通用处理器核[J].计算机研究与发展,2021,58(6):1230-1233.
[9] 黄正伟,刘宏伟,徐渊.用于IToF传感器的极低功耗RISC-V专用处理器设计[J].计算机工程,2022,48(9):146-154.
[10] 杨凯峰,张雪倩,冯娇,等.基于遗传进化策略的处理器验证方案[J].微电子学与计算机,2021,38(5):25-29.

PDF(1328 KB)

Accesses

Citation

Detail

段落导航
相关文章

/