Font Size: a A A

Research On Protection Of Memory Confidentiality And Integrity For Embedded Systems

Posted on:2016-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:X H LiFull Text:PDF
GTID:2348330542475777Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The protection of memory data in embedded system is becoming more and more important because of the role of the system played in the daily life of human beings.The memory data of embedded system is vulnerable to active attack and passive attack.The integrity of these data is broken by active attack,and the confidentiality can be destroyed by passive attack.Make the situation more worse is that the data stored in memory are operated in plaintext form by embedded system.Therefore,it is necessary to protect the confidentiality and integrity of these data to construct the trusted compute platform,to make us can believe the result obtained by the computer's operation.A novel memory data integrity protection: HMBC,is proposed in this paper.As we all know that it has no possibility to break the integrity of data blocks and counters at the same time,by hiding the mapping of blocks and the associated counters.The proposed scheme can help the system to defense active attacks,with reduce the system performance slowdown and storage space overhead.As a significantly important research topic for building the trusted compute platform,the confidentiality protection of memory data is catching people's attention,and many protections are proposed.And counter mode encryption method is becoming a most popular confidentiality protection scheme based on its performance advantage.Unfortunately,counter overflow is a most troublesome problem in counter mode encryption method,because it compels the system to suspend on-going tasks,change secret key used in encryption operations,assign new counters for all related blocks,re-encrypt these blocks by using the new key and counters,reduce the system performance significantly.In order to resolve this problem,a novel counter construction scheme: ECOH,is designed in this paper.At the same time,a new architecture of counter mode encryption is built.The proposed ECOH mechanism can smoothly take the counter overflow's impact on the system performance away,construct the performance-friendly trusted compute platform.The most popular and open-source computer architecture simulator: Simplescalar,is used to build simulation architecture in this paper,to evaluate the proposed schemes: HMBC and ECOH.The simulation result shows that the designed mechanisms are low-load,low-overhead and performance-friendly schemes for embedded systems,and the trusted application operation environment can be built by using the two schemes.
Keywords/Search Tags:Integrity protection, Confidentiality protection, Embedded system, HMBC, ECOH
PDF Full Text Request
Related items