Font Size: a A A

Design And Implementation Of Embedded Trusted System Based On Loongson Processor

Posted on:2019-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:P YiFull Text:PDF
GTID:2428330596951102Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the increasingly powerful functions of embedded systems,embedded systems have been widely used in many security-critical areas like aerospace and defense electronics.Trusted computing based on Root of Trust has evolved into an industrial technology that protects computing infrastructures and billions of terminals.Root of Trust is the foundation of embedded integrity protection and serve as the cornerstone of trusted computing.Root of Trust also establishes trust chain when starting the system.Then,the chain of trust would pass to the application layer.Integrity Attestation verify system integrity at run time,which is the core of integrity protection of embedded systems.This thesis studies the security-critical issues such as the design of trusted root,the transfer of trust chain and integrity measurement in embedded systems.The research work mainly includes:(1)This thesis analyzes the security threats faced by embedded systems firstly,research the Trusted Computing technology.Then,an embedded root of trust based on dual-kernel architecture is improved.and the transfer of trust chain according to the root of trust is designed.The experimental results show that the designed scheme verifies the integrity of the system from the root of trust to the operating system during startup,and reduces the length of the trust chain to improve the security of the system during startup.(2)Aiming at the shortcomings that exits in the current Integrity Attestation technology in terms of accuracy and efficiency,a descriptive model based on behavior information of process is designed to extract the characteristics of process behavior features.An integrity measurement method based on behavior information of process is given and an integrity attestation mechanism is designed.The experimental results show that the integrity measurement based on behavioral information of process can provide effective integrity protection with higher efficiency of measurement.(3)On the basis of the research work above,the thesis codes and realizes each functional module.an embedded trusted system based on Loongson processors is designed and initially implemented,which complete the integrity check from the root of trust to the process in application layer.In addition,relevant experiments are performed through the rootkit tools.The experimental results show that applying the embedded root of trust and integrity measurement architecture designed in this thesis can effectively verify the integrity status of platform with higher efficiency.
Keywords/Search Tags:Trusted Computing, Embedded System, Loongson, Root of Trust, Integrity Measurement, Integrity Attestation
PDF Full Text Request
Related items