Task processing method and device for preventing side channel attacks

A side-channel attack and task processing technology, applied to computer-readable storage media to prevent side-channel attacks in the field of task processing, can solve problems such as high overhead, waste of resources, and increased costs, so as to reduce resource overhead, ensure independence, The effect of improving safety

Pending Publication Date: 2021-01-08
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in terms of software, there is no strong encryption algorithm against side channel attacks, which will increase the cost and cause waste o...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task processing method and device for preventing side channel attacks
  • Task processing method and device for preventing side channel attacks
  • Task processing method and device for preventing side channel attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solutions and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. All other embodiments obtained under the premise of creative labor belong to the scope of protection of this application.

[0038] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0039] In the following description, the terms "first\second" are only used to distinguish similar objects, and do not represent a specific order for objects. Understandably, "first\second" can be The specific order or sequencing is interchanged such that the embodiments of the application described herein can be practiced in other sequences than illustrated or descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a task processing method and device for preventing side channel attacks based on a heterogeneous computing system and a computer readable storage medium. The method comprises the steps of performing task division on a to-be-executed first task to obtain at least two first sub-tasks, determining a random probability number, and dynamically adjusting the at least two first sub-tasks according to the random probability number to obtain at least two to-be-executed first sub-tasks, and allocating the at least two first sub-tasks to be executed to at least one processing unitmatched with the task characteristics, and respectively executing the at least two to-be-executed first sub-tasks by the at least one processing unit corresponding to the at least two to-be-executed first sub-tasks. Through adoption of the method and the device, the side channel attack can be effectively resisted, the resource overhead is reduced, and the information security is improved.

Description

technical field [0001] The present application relates to information security technology, and in particular to a task processing method and device for preventing side channel attacks based on a heterogeneous computing system, and a computer-readable storage medium. Background technique [0002] With the development of information technology, problems related to information security emerge in endlessly. Among them, side channel attacks have become a major problem in information security. In order to solve the problems of information leakage and information cracking under side channel attacks, the existing technology mainly protects from two aspects: software and hardware: the software considers the possibility of leakage, and uses encryption algorithms to ensure information security even under side channel attacks; In terms of hardware, redundant information is added to blur the physical information of signal jumps during task execution, so that attackers cannot obtain enou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/556
Inventor 刘君
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products