IJCNIS Vol. 2, No. 1, 8 Nov. 2010
Cover page and Table of Contents: PDF (size: 195KB)
Full Text (PDF, 195KB), PP.52-59
Views: 0 Downloads: 0
SoC, COS, security system design, trusted measurement, trusted transfer strategy
According to the relevant criterion and principle for designing and evaluating various trusted computing chips, we have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, we have discussed the design of the trusted SoC security architecture and the main module functional modules such as microprocessor, cryptographic function module, security management module, input/output interface, along with the most important memory management unit. Moreover, we have discussed reliability of relevant parameters and transfer strategy for trusted root in chip development and application, together with the simulation and validation of corresponding functions. At last, we point out that one of the most important further research directions is the trusted measurement of dynamic data and software running in security environment.
Xianwen Yang, Luguo Zhang, Zheng Li, Shixiong Zhu, Wenzheng Zhang, Yongqi Lv, "System Design of a Trusted SoC and Detailed Analysis of its Secure State Transitions", International Journal of Computer Network and Information Security(IJCNIS), vol.2, no.1, pp.52-59, 2010. DOI:10.5815/ijcnis.2010.01.08
[1] C.-H. Anne , W. Thomas W. D. Shinder, et al.. Introduction to Information Security. The Best Damn Firewall Book Period, 2008, pp 3-52.
[2] J. Dong, K. Ackermann, C. Nita-Rotaru. “Secure group communication in wireless mesh networks”. Ad Hoc Networks, vol. 7, pp. 1563-1576, 2009.
[3] S. Mühlbach, S. Wallner. Secure communication in microcomputer bus systems for embedded devices. Journal of Systems Architecture, vol. 54, pp. 1065-1076, 2008.
[4] D. Feng, “Support platform and interface criterion of trusted computing cryptography technology,” Beijing, State password administration, 2007.(in Chinese)
[5] Trusted Computing Group, “TPM Main Part 1: Design Principles, Version 1.2, Revision 94,” http://www.trustedcomputinggroup.org/specs/TPM/Main Part1/Rev 94.zip, 2007.
[6] Trusted Computing Group, “TPM Main Part 2: TPM Structures, Version 1.2, Revision 94,” http://www.trustedcomputinggroup.org/specs/TPM/Main Part2/Rev 94.zip, 2007.
[7] Common Criteria for Information Techology Security Evaluation, Part 1: Introduction and general model, Version 2.3, August 2005. http://www.commoncriteriaportal.org/
[8] L. Zhang, L. Zheng, R. Wang, and S. Wen, “Desing and Implementation of Multiple Cryptographic Algorithm Interface Circuit Based on Secure SoC,” in Proceedings of International Conference on Wireless communications, Networking and Information Security, Beijing, 2010, pp. 510~514.
[9] F. Salewski. A. Taylor. “Fault handling in FPGAs and microcontrollers in safety critical embedded applications: a comparative survey”. In Proceedings of DSD 2007 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools, August 29–31, 2007.
[10] F.Vahid. “It’s time to stop calling circuits ‘Hardware’. IEEE Computer, vol. 40, pp. 106-108, 2007.
[11] H. Mouratidis, P. Giorgini. Integrating Security and Software Engineering: Advances and Future Visions. Idea Group Publishing, 2006.