节点文献

一种基于可信锚点的机密计算环境构建方法

A Construction Method of Confidential Computing Environment Based on Trusted Anchor

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 蒋新竹赵波李蔚栋张立强严飞王娟安扬

【Author】 JIANG Xinzhu;ZHAO Bo;LI Weidong;ZHANG Liqiang;YAN Fei;WANG Juan;AN Yang;School of Cyber Science and Engineering, Wuhan University;School of Computer Science, Wuhan University;

【机构】 武汉大学国家网络安全学院武汉大学计算机学院

【摘要】 机密计算环境的构建与使用,是保障信息数据安全的重要技术手段。然而,现有的机密计算环境的形成,其信任锚点来自硬件处理器,机密计算环境的构成依赖于缺乏可证明安全的软件栈实现。近年来包括各大主流CPU厂商的硬件安全漏洞频现,各种针对现有机密环境构造弱点的攻击频发,都给依赖机密计算环境的各种安全应用和数据带来严重威胁。可信计算是一种将可信根作为信任锚点,以可信度量为手段,用信任链方式构造可信执行环境的安全方法和技术,将可信计算技术用于机密计算环境构建,可以有效解决上述安全问题。文章从可信的角度提出了一种构造自主可控的机密计算环境的新思路。可信锚点的服务是保障机密计算环境安全的前提,在可信锚点之上建立具有内存隔离等特性的机密计算环境。文章研究的完成,将有效解决现有机密计算场景的安全威胁,提升具有自主可控关键基础设计的能力。

【Abstract】 The construction and use of confidential computing environment are an important technical means to ensure the security of information data. However, its trust anchor is formed from hardware processors in existing confidential computing environments, and the construction of the confidential computing environment depends on the lack of provably secure software implementations. In recent years, the hardware security vulnerabilities of CPU manufacturers appear frequently, and many attacks of existing confidential environment vulnerabilities occur frequently, which brings a serious threat to the various security applications and data that rely on the confidential computing environment. Trusted computing takes the root of trust as a trust anchor, the reliability measures is used as a means, the chain of trust is used to construct the security method and technology of trusted execution environment, Therefore, the trusted computing technology is used to construct the confidential computing environment and effectively solve the above safety problem. In this research, an autonomous controllable confidential computer environment and its security ability are proposed from the perspective of trusted computing. The function of trust anchor is the premise to ensure the security of confidential computing environment. a confidential computing environment with memory isolation features can be built on trust anchor, which can effectively solve the security threats in the existing confidential computing environments and improve the capability of independently controlling the key foundation designs.

【基金】 国家自然科学基金联合基金(U1936122);湖北省重点研发计划(2020BAB101;2021BAA027);华为网络设备韧性和完整性保护技术研究项目
  • 【文献出处】 网络空间安全科学学报 ,Journal of Cybersecurity , 编辑部邮箱 ,2023年01期
  • 【分类号】TP309
  • 【下载频次】6
节点文献中: 

本文链接的文献网络图示:

本文的引文网络