A TrustZone Based Application Protection Scheme in Highly Open Scenarios
-
摘要: 针对BYOD(bring your own device)、移动云计算等兼具强安全性、高开放性需求的新型应用场景,提出了一种移动嵌入式平台敏感应用防护方案.为满足强安全性需求,方案基于ARM TrustZone硬件隔离技术构建可信执行环境,即使在整个操作系统内核被攻破的情况下仍能保证敏感应用的安全.为满足高开放性需求,方案实现了传统TrustZone安全方案不具备的两大优势.首先,将TrustZone保护域扩展至普通世界,安全世界不再实现具体的敏感应用,而只实现一个轻量级监控模块用以监控普通世界内核的行为.因此整个系统可信计算基不随敏感应用数量的增加而增大,减少了其可攻击面和潜在漏洞。其次,监控模块确保内核为这些敏感应用提供安全的系统服务,从而为满足开放性需求提供关键功能支持,例如提供标准系统调用接口、敏感应用动态部署和加载等. 最后,方案提出了内核主动证明机制,要求内核主动提供关键信息协助监控模块验证其自身行为,有效提高了系统运行效率.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率.Abstract: We propose a protection scheme for security-sensitive applications on mobile embedded devices, which is focus on the scenarios with both strong security and high openness requirements, such as “bring your own device”, mobile cloud computing. To meet the security requirements, we leverage the trusted execution environment of ARM TrustZone to provide strong isolation guarantees for applications even in the presence of a malicious operating system. To meet the openness requirements, our scheme has two major advantages compared with previous TrustZone-based solutions. Firstly, it moves concrete sensitive applications from TrustZone secure world to the normal world, so that the trusted computing base keeps small and unchanged regardless of the amount of supported security applications. Secondly, it leverages a light-weight kernel monitor in the secure world to enforce the untrusted operating system to serve these security applications legally, so that they could securely use standard system calls, which could provide critical features for the openness requirements, such as dynamic application deployment. We also propose proactive attestation, a novel technique that greatly improves the system efficiency by enforcing the operating system to contribute to its own verification. We implement the prototype system on real TrustZone devices. The experiment results show that our scheme is practical with acceptable performance overhead.
-
-
期刊类型引用(9)
1. 韦晓敏,彭灿华. 基于Prim的物联网安全数据融合信誉度模型. 计算机仿真. 2022(06): 421-424+443 . 百度学术
2. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 . 百度学术
3. 王珊慧. 基于异常数据驱动数据融合方法. 科技创新与应用. 2021(02): 135-137 . 百度学术
4. 曲艺. 轻量级物联网数据三维空间安全交换方法仿真. 计算机仿真. 2021(06): 273-277 . 百度学术
5. 曾丽,曾玉林. 基于节点信誉度的传感器数据安全融合方法. 计算机仿真. 2021(07): 290-293 . 百度学术
6. 曾纪钧,陆庭辉. 基于区块链技术的物联网通用数据认证传输技术研究. 电子设计工程. 2021(15): 106-110 . 百度学术
7. 孔令信,马亚军. 基于模糊矩阵的大数据自适应迁移融合仿真. 计算机仿真. 2020(03): 389-392 . 百度学术
8. 张娜. 可信物联网虚拟化数据中心数据融合结果检测技术研究. 内蒙古农业大学学报(自然科学版). 2020(04): 70-75 . 百度学术
9. 陈二阳,袁姜红,黎忠文,蒋毅,江丹. 基于JSON的土壤环境监测物联网感知源信任评价模型研究. 西安理工大学学报. 2020(04): 557-561 . 百度学术
其他类型引用(1)
计量
- 文章访问数: 1732
- HTML全文浏览量: 1
- PDF下载量: 557
- 被引次数: 10