Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A hardware-based embedded system confidentiality protection method

An embedded system, confidentiality technology, applied in memory systems, instruments, electrical digital data processing and other directions, can solve the problems of multiple on-chip hardware resources, system performance loss, system resource waste, etc., to achieve low implementation cost and performance loss, Reduce the impact of system performance and avoid leakage effects

Active Publication Date: 2018-12-07
BEIHANG UNIV
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Using a coprocessor or software to encrypt and decrypt the program code and data of the embedded system wastes the limited system resources of the embedded system and causes a large loss of system performance;
[0006] (2) The common hardware-based confidentiality protection method needs to implement the hardware encryption module and the hardware decryption module at the same time, which consumes more on-chip hardware resources;
[0007] (3) Common confidentiality protection methods serially operate access to external memory and password calculation, that is, it is necessary to read data from the memory and then decrypt it, or encrypt the data and then store it in the memory. Large system performance loss;
[0008] (4) The common hardware-based confidentiality protection method connects the hardware encryption and decryption logic in the memory controller or memory chip. For an embedded system with multiple memories, it is necessary to instantiate the encryption engine one by one in the controller or memory chip, resulting in waste of system resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware-based embedded system confidentiality protection method
  • A hardware-based embedded system confidentiality protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings, but it is not intended to limit the present invention.

[0040] figure 1 It is an operation flowchart of a hardware-based embedded system confidentiality protection method of the present invention.

[0041] A kind of hardware-based embedded system confidentiality protection method of the present invention, such as figure 1 As shown, the method includes specific implementation steps as follows:

[0042] Step 1, according to the selected embedded processor, select the corresponding compiling and linking tool chain, and compile and link the user source program to generate the embedded system target code;

[0043] Step 2, preprocessing the target code on the host computer, encrypting the target code, and downloading the encrypted target code to the non-volatile memory of the embedded system. The method used here is to align the code segment and data segment in the targe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hardware-based embedded system confidentiality protection method, which comprises the following steps: 1, generating an object code; 2, encrypting that object code and storing the object code into a non-volatile storage; 3, power-on resetting; 4, executing a program, such as a cache miss or a data cache write-back, and executing step 5; otherwise, executing step 4 untilthe program ends; 5, if that out memory is written, executing step 6; otherwise, executing step 8; 6, carrying out truncating and filling, generating pad with hardware encryption logic, and generating ciphertext with data of exclusive OR cache line; 7, writing that ciphertext into the external memory, and executing the step 4; 8, truncating and filling that physical address corresponding to the cache line, generating the pad by the hardware encryption logic, and exclusively or reading the ciphertext from the external memory to obtain instructions or data; 9, sending instructions or data intothat processor and write corresponding cache lines, and executing step 4. Through the above steps, the method can realize the confidentiality protection of the embedded system with lower performance cost and implementation cost.

Description

technical field [0001] The present invention provides a hardware-based embedded system confidentiality protection method, which is a confidentiality protection method for embedded systems, and the method is applied to program and data encryption and decryption and security protection stored in the embedded system. Can improve the robustness of the embedded system. The invention belongs to the technical field of embedded system information security. Background technique [0002] Embedded devices have been widely used in people's daily life. More and more embedded terminals and increasingly expanding online interconnection make the security of embedded systems attract extensive attention. At present, common attack methods against embedded systems include hardware attacks represented by hardware Trojan horses, chip reverse, sideband attacks, memory chip unsoldering analysis, malicious code injection, buffer overflow, data or code tampering, instruction Software attacks repres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
CPCG06F12/1408
Inventor 王翔王维克郝强张准徐斌张晓冰田运通杜培
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products