Journal of Guangxi Normal University(Natural Science Edition) ›› 2020, Vol. 38 ›› Issue (2): 43-50.doi: 10.16088/j.issn.1001-6600.2020.02.005

Previous Articles     Next Articles

Server Trusted Framework Based on Trusted CPU Chip

XIU Guilin1, ZHANG Bowei1, LIU Fan2, LUO Ao1*   

  1. 1. Institute of Microelectronics, Tsinghua University, Beijing 10084, China;
    2. Montage Technology, Shanghai 200233, China
  • Received:2019-10-08 Published:2020-04-02

Abstract: The server is a fundamental facility for today’s information systems, cloud data storage and processing. CPU is the core element of the server. The current CPU circuit is extremely large in scale and complicated in production process, and its design, packaging and manufacturing are heavily dependent on foreign technologies and manufacturers. How to ensure the security and credibility of the processor chip is a key to network security and information security. But till today, credible research on the hardware behavior trustworthiness of CPU chip has not aroused sufficient attention. This paper first gives the concept of “trusted CPU chip”, combing the security risks faced by CPU chips in recent years. On this basis, the implementation principle of trusted CPU chip based on Tsinghua University DSC technology and its server trusted framework are proposed. Finally, this paper explores the significance of the trusted CPU chip and its server trusted framework in the current hardware security scenarios and the extended applications in covering high security requirements.

Key words: server, CPU, DSC technology, hardware security, trusted framework

CLC Number: 

  • TP332
[1] LIPP M, SCHWARZ M, GRUSS D, et al. Meltdown: reading kernel memory from user space[C]//27th USENIX Conference on Security Symposium. Berkeley,CA: USENIX Association, 2018: 973-990.
[2] KOCHER P, GENKIN D, GRUSS D, et al. Spectre attacks: exploiting speculative execution[EB/OL]. (2018-01-03)[2019-10-08]. https://arxiv.org/abs/1801.01203.
[3] JIN Y. Introduction to hardware security[J].Electronics, 2015,4: 763-784.
[4] TEHRANIPOOR M, OUSHANFAR F. A survey of hardware trojan taxonomy and detection[J].IEEE Design & Test of Computers,2010,27: 10-25.
[5] BHASIN S, REGAZZONI F. A survey on hardware trojan detection techniques[C]//2015 IEEE International Symposium on Circuits and Systems(ISCAS). Lisbon,Portugal: IEEE, 2015: 2021-2024.
[6] BHUNIA S, HSIAO M, BANGA M, et al. Hardware Trojan attacks: threat analysis and countermeasures[J]. Proceedings of the IEEE,2014,102: 1229-1247.
[7] KRIEG C, DABROWSKI A, HOBEL H, et al. Hardware malware[J].Synthesis Lectures on Information Security, Privacy, & Trust,2013,4: 1-115.
[8] XIAO K, FORTE D, JIN Y, et al. Hardware trojans: lessons learned after one decade of research[J].ACM Transactions on Design Automation of Electronic Systems(TODAES),2016,22: 6.
[9] ROSTAMI M, KOUSHANFAR F, RAJENDRAN J, et al. Hardware security: threat models and metrics[C]//Proceedings of the International Conference on Computer-Aided Design. San Jose, CA:IEEE, 2013: 819-823.
[10]IMESON F, EMTENAN A, GARG S, et al. Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation[C]//22nd USENIX Conference on Security Symposium. Berkeley,CA: USENIX Association,2013: 495-510.
[11]XIAO K, TEHRANIPOOR M. BISA: built-in self-authentication for preventing hardware Trojan insertion[C]//2013 IEEE International Symposium on Hardware-Oriented Security and Trust(HOST). Austin,TX: IEEE,2013: 45-50.
[12]NARASIMBAN S, YUEH W, WANG X, et al. Improving IC security against Trojan attacks through integration of security monitors[J].IEEE Design & Test of Computers,2012,29: 37-46.
[13]SALMANI H, TEHRANIPOOR M, PLUSQUELLIC J. A novel technique for improving hardware Trojan detection and reducing trojan activation time[J].IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2011, 20: 112-125.
[14]KASH J, TSANG J, KNEBEL D. Method and apparatus for reverse engineering integrated circuits by monitoring optical emission: US Patent 6,496,022[P]. 2002-12-07.
[15]CHAKRABORTY R, WOLFF F, PAUL S, et al. MERO: a statistical approach for hardware Trojan detection[C]// International Workshop on Cryptographic Hardware and Embedded Systems: LNCS 5747. Cham, Switzerland: Springer, 2009: 396-410.
[16]BANGA M, CHANDRASEKAR M, FANG L, et al. Guided test generation for isolation and detection of embedded Trojans in ics[C]//Proceedings of the 18th ACM Great Lakes symposium on VLSI.Orlando, Florida:ACM,2008: 363-366.
[17]NARASIMBAN S, DU D, CHAKRABORTY R, et al. Hardware Trojan detection by multiple-parameter side-channel analysis[J].IEEE Transactions on Computers,2012,62: 2183-2195.
[18]LAMECH C, RAD R, TEHRANIPOOR M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities[J].IEEE Transactions on Information Forensics and Security,2011,6(3): 1170-1179.
[19]KOUSHANFAR F, MIRHOSEINI A. A unified framework for multimodal submodular integrated circuits Trojan detection[J].IEEE Transactions on Information Forensics and Security,2010,6(1): 162-174.
[20]BHUNIA S, HSIAO M S, BANGA M, et al. Hardware Trojan attacks: threat analysis and countermeasures[J].Proceedings of the IEEE, 2014,102(8): 1229-1247.
[21]肖玮,陈性元, 包义保. 可重构信息安全系统研究综述[J].电子学报, 2017,45(5): 1240-1248.
[22]WANG Y, LIU L, YIN S, et al. On-chip memory hierarchy in one coarse-grained reconfigurable architecture to compress memory space and to reduce reconfiguration time and data-reference time[J].IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2014,22(5): 983-994.
[23]Intel. Management Engine[EB/OL]. [2019-10-08]. https://en.wikipedia.org/wiki/Intel_Management_Engine.
[24]澜起科技股份有限公司. 津逮®处理器动态安全监控技术(DSC)白皮书 [R/OL]. (2018-09-13) [2019-08-29]. http://www.montage-tech.com/cn/Jintide_CPU/index.html.
[1] TANG Tang,LUO Xiaoshu,Lü Wande,LIU Xin. Sliding Mode Active Disturbance Rejection Control of Quadrotor Unmanned Aerial Vehicle [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(2): 56-62.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] QIN Yingying, QI Guangchao, LIANG Shichu. Effects of Eichhornia crassipes Aqueous Extracts on Seed Germination of Ottelia acuminata var. jingxiensis[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 87 -92 .
[2] WEI Hongjin, ZHOU Xile, JIN Dongmei, YAN Yuehong. Additions to the Pteridophyte Flora of Hunan, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 101 -106 .
[3] LIN Yongsheng, PEI Jianguo, ZOU Shengzhang, DU Yuchao, LU Li. Red Bed Karst and Its Hydrochemical Characteristics of Groundwater in the Downstream of Qingjiang River, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 113 -120 .
[4] ZHANG Ru, ZHANG Bei, REN Hongrui. Spatio-temporal Dynamics Analysis and Its Affecting Factors of Cropland Loss in Xuangang Mining Area, Shanxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 121 -132 .
[5] LI Xianjiang, SHI Shuqin, CAI Weimin, CAO Yuqing. Simulation of Land Use Change in Tianjin Binhai New Area Based on CA-Markov Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 133 -143 .
[6] WANG Mengfei, HUANG Song. Spatial Linkage of Tourism Economy of Cities in West River Economic Belt in Guangxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 144 -150 .
[7] LIU Guolun, SONG Shuxiang, CEN Mingcan, LI Guiqin, XIE Lina. Design of Bandwidth Tunable Band-Stop Filter[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 1 -8 .
[8] WEN Yuzhuo, TANG Shengda, DENG Guohe. Analysis of the Ruin Time of Threshold Dividend Strategy Risk Model under Stochastic Environment[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 56 -62 .
[9] FENG Xiu, MA Nannan, ZHI Hongtao, HAN Shuangqiao, ZHANG Xiang. Removal of Low Concentration Cadmium Ion in the Wastewater by Heavy Metal Capturing Agent UDTC[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 63 -67 .
[10] CHEN Menghua,LIU Min,WANG Ning. Predictive Power of the Weizscker-Skyrme Nuclear Mass Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(1): 1 -8 .