Font Size: a A A

The Design Of The Architecture For Secure Isolated Execution Based On PowerPC

Posted on:2017-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y N LiFull Text:PDF
GTID:2348330512480378Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer information systems,security of information systems has become a pivotal issue that generates an important influence on military,civil and many other fields.However,modern computer system software layers are growing into large and very complex pieces of code,the number of vulnerabilities which can be exploited by malicious attackers also increases.Only using software to protect against malicious attacks has become increasingly difficult,thus,the use of hardware-assisted protection has become the trend of current security technologies.At the same time,IBM opened the source of the widely used embedded PowerPC processor to research and educational institution.Therefore,in this paper,we studied the security technology for PowerPC processor.This thesis proposes and evaluates a secure architecture design for PowerPC.Based on the idea of isolated execution,we partition PowerPC processor states into secure state and non-secure state to ensure secure sensitive data and programs running in secure state against malicious attacks.This thesis proposes the secure PowerPC design,introduce a new processor state to control processor state switch between secure and non-secure,we also modify register,interrupt,instruction set,etc.The design also makes secure extensions to all hardware resources,including storage systems,DMA,Cache,MMU and other modules.Eliminating the need of dedicated security processor cores,while also saving the chip area and power consumption..Finally,this thesis uses high-level modeling method to model the design on QEMU and evaluate instruction set,secure memory access,secure Cache access,the experiment results shows that the proposed secure architecture effectively protect the application running in secure state.
Keywords/Search Tags:Power PC, isolated execution, QEMU, hardware-assisted security
PDF Full Text Request
Related items