计算机工程与应用 ›› 2008, Vol. 44 ›› Issue (17): 10-14.

• 博士论坛 • 上一篇    下一篇

基于层次平台的安全SoC设计技术

童元满,陆洪毅,王志英,戴 葵   

  1. 国防科学技术大学 计算机学院,长沙 410073
  • 收稿日期:2008-01-23 修回日期:2008-03-17 出版日期:2008-06-11 发布日期:2008-06-11
  • 通讯作者: 童元满

Design methodology for secure SoC based on hierarchical platform

TONG Yuan-man,LU Hong-yi,WANG Zhi-ying,DAI Kui

  

  1. School of Computer Science,National University of Defense Technology,Changsha 410073,China
  • Received:2008-01-23 Revised:2008-03-17 Online:2008-06-11 Published:2008-06-11
  • Contact: TONG Yuan-man

摘要: 在基于层次平台的SoC设计方法学基础上,文中提出了安全SoC设计关键技术,主要包括基于可信计算体系结构的安全SoC层次化设计平台、在安全SoC设计中引入独立的安全约束及安全约束映射技术以及安全验证技术。从软件攻击、旁路攻击和物理攻击等角度,定义安全约束并验证防护技术的有效性。文中给出的安全SoC设计技术不仅可以充分重用已有的设计资源,也可充分利用现有的层次平台设计技术及相关辅助设计工具。

关键词: 安全SoC, 层次平台, 设计方法学, 安全约束, 安全验证, 软件攻击, 旁路攻击, 物理攻击,

Abstract: With the hierarchical platform based SoC design methodology,the key design technique for secure SoC is presented.Firstly,the hierarchical secure SoC platform based on the architecture of trusted computing is constructed.Independent constraints of security are introduced to the design and implementation of secure SoC.And the security constraints transmission and the validation of security are presented.The security constraints and validation include three sides,i.e.,the ability to resist software attack,side-channel attack and physical attack.The presented design method not only reuses the existing design resources to a large degree,but also reuses the existing platform based on SoC design technique and aided design environment.

Key words: secure SoC, hierarchical platform, design methodology, security constraints, security validation, software attack, side-channel attack, side-channel attack