Physical memory isolation method based on RISC-V instruction architecture

A RISC-V, physical memory technology, applied in electrical digital data processing, protection of internal/peripheral computer components, instruments, etc., can solve problems such as limited programs, no hardware support, and limited quantity

Active Publication Date: 2020-09-11
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limited number of static divisions of physical memory intervals, Sanctum, like Keystone, has the problem of limited TEE programs supported at the same time.
At the same time, the design of Sanctum and Keystone did not take into account the problem that there is no hardware support for page table translation in IoT devices, which means that the operating system kernel cannot limit the user's memory access interval through the page table, that is, the memory access interval of any user program It does not need to go through the conversion of virtual address to physical address, and can directly use the physical address to access the code and data of any other program or even the operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical memory isolation method based on RISC-V instruction architecture
  • Physical memory isolation method based on RISC-V instruction architecture
  • Physical memory isolation method based on RISC-V instruction architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0068] A physical memory isolation method based on the RISC-V instruction architecture provided by the present invention is based on the existing Machine mode configurable physical memory isolation technology PMP of the RISC-V instruction architecture, and a Supervisor mode is added. Configurable physical memory isolation technology sPMP;

[0069] The physical memory isolation technology sPMP: depends on several groups of sPMP registers that only the Machine mode program and the Supervisor mode program ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a physical memory isolation method based on an RISC-V instruction architecture. According to the method, on the basis of an existing PMP (physical memory isolation) technology capable of being configured by a Machine mode of an RISC-V instruction architecture, an sPMP (physical memory isolation) technology capable of being configured by a Supervisor mode is added; the physical memory isolation technology sPMP depends on a plurality of groups of sPMP registers which can only be read and written by a Machine mode program and a Supervisor mode program. According to the invention, the limitation of the number of security applications of the existing TEE system based on the PMP register set is broken through, and the characteristics of efficient security application starting, efficient security application communication, fine-grained security application memory resource allocation and the like can be provided. Compared with the existing TEE design, the safety and theexpandability of the system are greatly improved.

Description

technical field [0001] The invention relates to the security field of application programs, in particular to a physical memory isolation method based on RISC-V instruction architecture. In particular, it relates to an operating system privilege level physical memory isolation hardware technology (Supervisor-mode Physical Memory Protection) based on the RISC-V instruction set architecture and a system and method for providing a trusted execution environment by combining software and hardware. Background technique [0002] RISC-V instruction set architecture: RISC-V architecture is an open source instruction set architecture based on the principle of reduced instruction set (RISC) first proposed by the University of California, Berkeley in 2010. Different from common commercial instruction set architectures such as X86 and ARM, RISC-V, as an open source instruction set architecture, can be freely and freely applied to any purpose and scenario, allowing developers or chip manuf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/79
CPCG06F21/604G06F21/79Y02D10/00
Inventor 路旭杜东夏虞斌陈海波
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products