Font Size: a A A

Research Of The Software Integrity In Embedded Systems

Posted on:2011-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:H Q HuangFull Text:PDF
GTID:2178330332971563Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the development of computer science, embedded systems (ES) pemeates into people's whole life. Since the portability of ES, more and more people store their important information in ES, such as laying personal ID, bank card number in mobile phone, PDA and so on.However, so much ES are in danger and so few ES have their own protection. Those violators can stole this sensitive information easily; inject some malicous software tapping communication and forge ES witout detection. Therefore, security of ES is threatening extremly.Today most security protections focus on PC. ARM's Trustzone, the security processor, is the typical example. It assembles two processors into one chip; one is for normal world and the other for security world. Whereas, security processor is less various amd more expensive, it does not fit ESs low cost and universibility. The other method is to transport the trust computing into ES. Trust computing is based on trust root and relies on the computing chain to realize ES's security. However the trust root in ES lacks enough security, those guies could import malious code into moible phone without detection.This thesis is just based on trust computiong and deisgns a protection for computing root, in other words, Flash Guard Embedded Systems (FGES). This system take advantage of FPGA hardware programming without changing the original system architecture.and it also meets ES's universility. This computing embedded system could realize high level security.This thesis contain seven parts, the fisrt part gives some backgroud of ES security; the second section shows the whole arcjotecture of FGES; the third part pais attention of FGES hardware design. After that, this thesis elaborates FPGA design, which is the key component for FGES. The fifth section and sixth section show TCM and uclinx programming; the seventh section gives FGES's security analysis and the last part focuses on FGES security analysis.
Keywords/Search Tags:Embedded Systems Security, TCM, FPGA Design
PDF Full Text Request
Related items