博碩士論文 111522073 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator黃浩洋zh_TW
DC.creatorHao-Yang Huangen_US
dc.date.accessioned2024-7-26T07:39:07Z
dc.date.available2024-7-26T07:39:07Z
dc.date.issued2024
dc.identifier.urihttp://ir.lib.ncu.edu.tw:444/thesis/view_etd.asp?URN=111522073
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract隨著生活、工業環境的需求下,Internet of Things(IoT)設備數量正以飛快的速度成長。但也因為IoT的影響與日俱增,現在許多的IoT設備服務需要處理包含安全性敏感的資訊,吸引了攻擊者針對IoT的安全進行破壞。在近年來,Trusted Execution Environment(TEE)安全概念也應用在IoT設備的系統上,其概念是透過將系統區分成安全與非安全兩個世界並將敏感的資訊儲存在安全世界的服務中如加密服務來防止外界的存取。ARM官方將TEE的概念實作在TrustZone-M(TZ-M)並將該功能置入應用於IoT設備的Armv8-M系列處理器中。基於TZ-M,為了提供一個認證的安全標準給更多的微控制器開發者,Trusted Firmware-M(TF-M)架構被引入作為Armv8-M系列處理器的IoT設備提供一定程度的保護。儘管如此,研究人員發現TF-M中存在由非安全世界中的程式傳遞惡意參數到安全世界的服務而導致的軟體漏洞可能會洩露機密。藉由分析相關的安全議題文獻,我們認為這個問題源自於TEE在將系統分成兩個世界後無法完全掌握來自非安全世界的服務呼叫者的性質。因此我們提出了TrustBUF,一種由安全世界處理的共享緩衝區通訊方法來確保兩個世界之間通訊的安全性,同時解決因TEE分割環境的特性所帶來的安全疑慮。為了展示TrustBUF的實用性,我們將系統的雛型實作在搭配了Arm Cortex-M33的STM32L562E-DK開發板上。zh_TW
dc.description.abstractWith the growing demand in living and industrial environments, the production of Internet of Things (IoT) devices is rapidly increasing. However, numerous IoT devices are now required to process security-related information, attracting attackers who exploit IoT security vulnerabilities. In recent years, the security concept of Trusted Execution Environment (TEE) has also been applied to IoT devices. TEE prevents external access by dividing the system into the Secure World and Normal World, and storing sensitive security information in the Secure World′s service such as the crypto service. ARM implements the TEE concept on TrustZone-M (TZ-M), integrated into the Armv8-M processors widely adopted in IoT devices. On top of the TZ-M, to provide a certified security standard for border MCU developers, the Trusted Firmware-M (TF-M) architecture is introduced as a certain level of protection for IoT devices in the Armv8-M chips family. Despite this, researchers have found software vulnerabilities in TF-M caused by programs in Normal World passing malicious arguments into Secure World′s service that can result in revealing the secret. By analyzing related security issue literature, we found this result originates from TEE′s inability to fully grasp the nature of the service caller from Normal World after dividing the system into two worlds. Therefore, we propose the TrustBUF, a shared buffer communication method handled by Secure World to ensure secure communication between the two worlds while addressing the security issue caused by the TEE intrinsic of dividing the processing environments. To demonstrate the practicality of TrustBUF, we implement the prototype system on the STM32L562E-DK development board with Arm Cortex-M33.en_US
DC.subjectIoT 安全zh_TW
DC.subject可信執行環境zh_TW
DC.subjectTrustZone-Mzh_TW
DC.subjectTrusted Firmware-Mzh_TW
DC.subject電腦安全zh_TW
DC.subjectIoT Securityen_US
DC.subjectTrusted Execution Environmenten_US
DC.subjectTrustZone-Men_US
DC.subjectTrusted Firmware-Men_US
DC.subjectComputer Securityen_US
DC.titleTrustBUF:實作於TF-M的共享緩衝區溝通方法zh_TW
dc.language.isozh-TWzh-TW
DC.titleTrustBUF: A Secure Shared Buffer Communication Method on TF-Men_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明