【24h】

Hardware-Assisted Security: From PUF to SGX

机译:硬件辅助安全性:从PUF到SGX

获取原文

摘要

Protecting modem software with hardware-based security is becoming increasingly more important in practice. We are witnessing this trend through recent developments in the processor technology such as Intel's SGX and AMD's SEV. Moreover, veteran hardware-based security technologies such as Physically Unclonable Functions (PUFs), Trusted Platform Modules (TPM) and ARM's TrustZone are still evolving. However, all these solutions suffer from various shortcomings: they are afterthought and ad-hoc, require strong trust in manufacturers or their involvement, not accessible to third party developers, not scalable, or vulnerable to side-channel or runtime attacks. On the other hand, academic research has aimed at addressing some of these problems in the recent past by providing various security architectures such as AEGIS, Bastion, Sanctum, Sancus, TrustLite, TyTAN, to name some. Unfortunately, these solutions have not found their way into practice yet. This talk summarizes some of the recent hardware-assisted security technologies, discusses their strengths and deficiencies and future directions.
机译:在实践中,使用基于硬件的安全性保护调制解调器软件变得越来越重要。我们正在通过英特尔SGX和AMD的SEV等处理器技术的最新发展见证这一趋势。此外,诸如硬件不可克隆功能(PUF),可信平台模块(TPM)和ARM的TrustZone之类的基于硬件的高级安全技术仍在不断发展。但是,所有这些解决方案均具有各种缺点:经过深思熟虑且是临时性的,它们需要制造商或其参与方的强烈信任,第三方开发人员无法访问,不可扩展或易受旁通道或运行时攻击。另一方面,学术研究旨在通过提供各种安全体系结构(例如AEGIS,Bastion,Sanctum,Sancus,TrustLite,TyTAN等)来解决最近出现的一些问题。不幸的是,这些解决方案尚未找到实现的途径。本演讲总结了一些最新的硬件辅助安全技术,并讨论了它们的优缺点和未来的发展方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号