RISC-V Architecture Processor Security Partitioning Method Based on Trusted Execution Environment

Wang Jian, Fu Zhibo, Ming Zhe

Integrated Circuits and Embedded Systems ›› 2023, Vol. 23 ›› Issue (9) : 16-19.

PDF(1328 KB)
PDF(1328 KB)
Integrated Circuits and Embedded Systems ›› 2023, Vol. 23 ›› Issue (9) : 16-19.
TOPICAL DISCUSS

RISC-V Architecture Processor Security Partitioning Method Based on Trusted Execution Environment

  • Wang Jian1,2, Fu Zhibo1,2, Ming Zhe1,2
Author information +
History +

Abstract

During the partitioning process of the RISC-V architecture processor,it is not in a trusted security environment,which causes the problem of the new row content replacing the old row content at will in some partition content,resulting in more overlapping parts of partition results.Therefore,a secure partitioning method for RISC-V architecture processors based on trusted execution environment is proposed.According to the virtual machine ID number in the request instruction,the virtual machine is bound to the virtual root instance to provide a secure environment for the security division in the RISC-V architecture processor.Integrate the secure memory encryption engine between the internal cache and the storage controller to generate single-shot chunks.The multi-user key symmetry algorithm is used to obtain the access ciphertext,and the Monte Carlo method is used to calculate the offset time corresponding to the current partition solution vector.According to the offset time series,the Cache method is used to color the physical pages of the partitioned trusted channel to avoid the problem of replacing old rows with new rows and obtain safe partitioning results.It can be seen from the experimental results that the minimum value of partition hit rate can reach 0.82 using the research method,which can achieve the ideal partition effect.

Key words

trusted execution environment / RISC-V architecture / security partition

Cite this article

Download Citations
Wang Jian, Fu Zhibo, Ming Zhe. RISC-V Architecture Processor Security Partitioning Method Based on Trusted Execution Environment[J]. Integrated Circuits and Embedded Systems. 2023, 23(9): 16-19

References

[1] 高启明,吴莉莉.基于最优虚拟截止日期多处理器混合时序调度[J].计算机工程与设计,2021,42(5):1376-1382.
[2] 梁秋玲,张向利,张红梅,等.基于多核处理器的关联任务并行感知调度算法[J].计算机工程,2021,47(7):212-217.
[3] 成元虎,黄立波,崔益俊,等.基于RISC-V的嵌入式多指令集处理器设计及实现[J].电子学报,2021,49(11):2081-2089.
[4] 牛世权.轻量级安全内存:RISC-V嵌入式微处理器安全增强[J].计算机工程与科学,2021,43(8):1360-1365.
[5] 娄冕,张海金,杨靓,等.基于Chisel语言的RISC-V处理器设计技术[J].微电子学与计算机,2021,38(3):51-55.
[6] 徐子晨,崔傲,王玉皞,等.基于RISC-V架构的强化学习容器化方法研究[J].计算机工程与科学,2021,43(2):266-273.
[7] 刘有耀,潘宇晨.基于RISC-V参数化超标量处理器的优化设计[J].计算机工程与应用,2022,58(5):66-74.
[8] 孙彩霞,郑重,邓全,等.DMR:兼容RISC-V架构的乱序超标量通用处理器核[J].计算机研究与发展,2021,58(6):1230-1233.
[9] 黄正伟,刘宏伟,徐渊.用于IToF传感器的极低功耗RISC-V专用处理器设计[J].计算机工程,2022,48(9):146-154.
[10] 杨凯峰,张雪倩,冯娇,等.基于遗传进化策略的处理器验证方案[J].微电子学与计算机,2021,38(5):25-29.
PDF(1328 KB)

Accesses

Citation

Detail

Sections
Recommended

/