A log-based method and system for proving control flow of embedded devices

An embedded device and control flow technology, applied in file systems, file system types, instruments, etc., can solve problems such as difficulty in verifying embedded devices, lack of key security storage, and inability to protect key security, etc. The effect of key leakage, improving security, and expanding the scope of use

Active Publication Date: 2021-01-01
SHENZHEN POWER SUPPLY BUREAU +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of technology can ensure that the control flow of the running program is consistent with the expectation, and resist the control flow attack of the opponent. It has good security, but it also has some shortcomings.
First of all, because each integrity report is an aggregate measurement value of the control flow path, when the control flow of the program is more complicated, it will be difficult to verify whether the integrity report of the embedded device is a legal report, and cannot Determine whether an embedded device is attacked by an adversary
Another shortcoming is the lack of safe storage of the key, which cannot protect the security of the key on the embedded platform, and the adversary can forge the report by stealing the key to deceive the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A log-based method and system for proving control flow of embedded devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0034] A log-based embedded device control flow proof method adopted in the present invention is based on figure 1 The system implementation shown, its principle steps are as follows:

[0035] 1. Preparation stage

[0036] a) Server and embedded device: First, use the initial code on the embedded device to collect the initial value of the on-chip SRAM on the embedded device and store it on the server, and deploy the logging function, key derivation function and signature function on the embedded device in the trusted execution environment. Among them, the log function is responsible for generating the actual log, the key derivation function is responsible for generating a key pair by using the SRAM PUF and the random number sent by the server, and the signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the log-based embedded equipment control flow proving method provided by the invention, key protection is carried out by using a lightweight trust root, proving is carried out by using amode of controlling a flow log, so that the security of a key on an embedded platform can be improved, and the integrity of the embedded equipment can be verified more effectively. The invention further provides a log-based embedded equipment control flow proving system which comprises embedded equipment and a server and is used for realizing the method provided by the invention.

Description

technical field [0001] The invention belongs to the technical field of remote certification of computer information, and in particular relates to a log-based certification method and system for embedded device control flow. Background technique [0002] With the continuous development of embedded systems, all kinds of embedded systems have penetrated into all aspects of people's production and life, playing an increasingly important role, especially in some such as medical equipment, industrial control systems, embedded devices play a vital role. Due to the increasing value involved, embedded systems are increasingly becoming targets for system disruption by attackers. [0003] Remote attestation technology is an important way to verify the integrity of remote devices. It usually includes two roles: verifier and prover. The prover is usually one or more remote devices, and the verifier is a server that wants to obtain the integrity of the remote device. The remote attesta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F16/18
CPCG06F21/602G06F21/6227G06F21/64
Inventor 吕志宁宁柏锋罗伟峰刘威邓巍秦宇刘敬彬赵世军冯伟习伟匡晓云姚浩于杨
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products