中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/86778
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 41646832      Online Users : 2276
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/86778


    Title: TruzMalloc: 基於TrustZone 的隱私資料保 護系統;TruzMalloc: A TrustZone-based Sensitive Data Protection System
    Authors: 楊承翰;Yang, Cheng-Han
    Contributors: 資訊工程學系
    Keywords: 敏感資料;防止資料外洩;可信執行環境;ARM Trust- Zone;Sensitive Data;Prevent Data Leakage;Trusted Execution Environment;ARM TrustZone
    Date: 2021-08-30
    Issue Date: 2021-12-07 13:12:26 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 隨著行動裝置的功能越來越強大,越來越多的應用程式會使用用
    戶的敏感資料。為了保護這些敏感資料,許多程式開發者會把這些需
    要使用敏感資料的應用程式放進可信執行環境執行(Trusted Execution
    Environments(TEE))。過去這幾年,許多攻擊都是針對目前市面上正在
    商業化使用的可信執行環境。這些不斷的攻擊事件不禁讓我們開始擔
    心可信執行環境的安全性。可以造成隱私資料外洩的堆疊溢位攻擊
    (Stack buffer overflow attack) 是最常見也是最危險的一種攻擊而且同樣
    會對可信執行環境造成傷害。在我們的論文中,我們實作了一塊獨立
    於安全世界(Secure World) 以及正常世界(Normal World) 的實體記憶體
    體空間來抵抗堆疊溢位攻擊。在可信執行環境中執行的可信執行程式
    (Trusted Applications (TAs)) 可以將敏感的資料存進我們的系統中來抵
    抗堆疊溢位攻擊造成的敏感資料外洩。我們的系統不會對可信執行環
    境造成過多的負擔而且可以有效的保護敏感資料。;As the functions of mobile devices continue to be introduced, more and
    more applications in mobile devices access the user?s sensitive data. In order
    to protect these sensitive data, many developers will put application that need
    to access user?s sensitive data into Trusted Execution Environments (TEEs)
    for execution. In the past few years, many attack aimed at the commercial
    TEE currently in use on the market. These endless attacks have made us
    worry about whether the security of TEE will be challenged. Stack buffer
    overflow attacks which makes sensitive data leakage is the most common and
    arguably the most dangerous attack and this attack also caused considerable
    damage to TEE. In this paper, we implemented an isolated physical memory
    outside Secure World and Normal World to resist stack buffer overflow attack.
    Trusted Applications (TAs) in TEE can seal their sensitive data in our system
    to prevent Stack buffer overflow attacks which makes sensitive data leakage.
    Our system will not cause too much overhead to TEE and can effectively
    protect the sensitive data.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML102View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明