首页|基于TrustZone硬件隔离技术的CLKScrew攻击防护研究

基于TrustZone硬件隔离技术的CLKScrew攻击防护研究

扫码查看
随着信息技术的迅猛发展,嵌入式系统中的安全性问题日益受到关注.本文针对嵌入式平台中动态电压频率调整技术存在的安全漏洞,基于高级精简指令集机器的TrustZone硬件隔离技术设计并实现了一种可信执行环境(TEE),利用TrustZone技术实现了TEE与普通执行环境操作系统间的切换.该环境能够有效抵御CLKScrew攻击,即通过多次调整中央处理器(CPU)线程工作频率来触发嵌入式平台的运行错误.实验结果表明,在该可信执行环境中,即使面临CLK-Screw攻击,CPU线程仍能正常工作,确保了系统的安全性.
Research on CLKScrew Attack Protection Based on TrustZone Hardware Isolation Technology
With the speedy development of information technology,security issue in embedded systems received an increasing attention. To solve the security vulnerabilities of dynamic voltage and frequency adjustment technology in embedded systems,a trusted execution environment ( TEE) based on ARM's TrustZone hardware isolation technology is designed and implemented. Switch between the TEE and the general execution environment operating system is realized by utilizing the TrustZone technology. The TEE could successfully defend against the CLKScrew attack that is repeatedly modifying the central pro-cessing unit ( CPU) thread working frequency to cause operation error for embedded platform. Experi-ment results indicate that in the TEE,CPU thread maintains operating even against the CLKScrew at-tack,ensuring the system security.

trusted execution environmentCLKScrew attackdynamic voltage and frequency adjustment

王建新、郑玉崝、许弘可

展开 >

北京电子科技学院,北京 100070

可信执行环境 CLKScrew攻击 动态电压频率调整

2024

北京电子科技学院学报
北京电子科技学院

北京电子科技学院学报

影响因子:0.245
ISSN:1672-464X
年,卷(期):2024.32(2)