Software Security

本文探讨了计算机、电子科学和技术发展背景下软件安全的重要性,包括物理访问保护、保密信息安全及关键安全系统的构建。文中还介绍了用于验证启动代码完整性的根信任机制,并讨论了运行时安全措施,确保应用程序运行期间代码不被恶意软件篡改。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Software Security

Overview

As the development of the computer, electric science and technology has permeated into every aspect of our life. Meanwhile, security problems generally come into people’s mind especially in automotive area. Security features must include not just physical access and protection of confidential information, but also critical safety systems. Designer must anticipate every form of attack to prevent access to embedded systems and data. The mechanisms needed to manage the security of an application may be implemented in software, hardware or a combination of both.

Image security

Typically, an attack will occur because malicious software has been allowed to executed during boot process or during run time. One approach to detect the boot code infection is to set up a root of trust mechanism that authenticates the boot code before it executes. A mechanism can be performed by a dedicated security module implemented in hardware entirely or a combination of hardware and software. One example of such a mechanism is the TPM specification.
In the secure offline environment, a hash made of software images, perhaps using SHA-256. The hash value, which uniquely represents the software images, is then signed with a private key that uniquely identifies the owner of the software. The resulting signature plus software image is then transmitted to the embedded memory system, which performs its own hash on the software image. The embedded system also authenticates the signature received from the offline environment using the public key that produced the signature. The authentication procedure results in a hash value that must match the value from hashing the software image. The methodology does not need encrypt the software that is being programmed, nor does it need to hide the signature or public key. Instead, the private key must be kept secret because it defines the identity of the provider of the software image. 7

Run Time Security

Flash programming assures the trustworthiness of code image before installing in your system. However, further measures are needed to ensure the integrity of the code is not modified by the malware while the application is running. Checking the integrity can be done prior to running the application using a secure boot technique that executes the integrity checker from a root of trust. If the resultant additional delay in boot time is not accessible, then another option might be to implement a run time integrity checker that executes in parallel with the application code, sharing the memory bus bandwidth with the application. The trade-off between the two techniques are the start-up time and memory bus bandwidth sharing.
TrustZone implemented in ARM-based products is also designed to enhance the security of software execution. This architecture could be considered an extension of the user/supervisor model that is implemented on a number of existing microprocessor architectures and has similar attributes to a hypervisor.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值