期刊文献+

一种Flash安全存储控制器的设计与实现 被引量:2

Design and Implementation of Flash Safe Storage Controller
下载PDF
导出
摘要 针对当前对Flash存储器中敏感数据的安全存储需求,设计实现了一种Flash安全存储控制器。通过数据加密技术和访问地址加扰技术保证存储数据的安全,并建立了一种分区访问控制机制,实现了不同等级用户的访问控制。对该存储控制器设计进行验证和分析,结果表明,设计的Flash安全存储控制器在保证Flash访问速率的基础上,实现了对Flash存储器的硬件级安全防护和分区访问控制,方法不仅可行,而且具有较强的实用性。 To protect the security of sensitive data stored in Flash memory,a Flash safe storage controller is designed and implemented.Data encryption technology and access address scrambling technology are used to ensure the safety of stored data,and a partition access control mechanism is established to achieve access control for users of different levels.The storage controller design is verified and analyzed.The experiment results indicate that the designed Flash safe storage controller realizes the hardware-level security protection and partition access control of the Flash memory on the basis of ensuring the Flash access rate.This method is not only feasible,but also has fairly strong practicability.
作者 何卫国 黄金金 李军 李雨励 饶金涛 HE Wei-guo;HUANG Jin-jin;LI Jun;LI Yu-li;RAO Jin-tao(Chengdu 30JAVEE Microelectronics Co.,Ltd.,Chengdu Sichuan 610041,China)
出处 《通信技术》 2020年第5期1300-1303,共4页 Communications Technology
基金 四川省重大科技专项(No.2018GZDZX0003)。
关键词 FLASH控制器 安全存储 访问控制 SM4 Flash controller safe storage access control SM4
  • 相关文献

参考文献5

二级参考文献30

  • 1黄小苑,戴紫彬.基于FPGA的AES算法芯片设计实现[J].微电子学与计算机,2005,22(8):62-64. 被引量:5
  • 2陈驰,冯登国,徐震.信息安全产品安全保证量化评估方法研究[J].电子学报,2007,35(10):1886-1891. 被引量:5
  • 3向楠,戴紫彬,徐劲松.一种基于BENES网络的可重构比特置换系统设计[J].计算机工程,2007,33(22):178-180. 被引量:4
  • 4LIE D,THEKKATH C, HOROWITZ M.Implementing an untrusted operating system on trusted hardware[C].In:SOSP'03 : Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003 : 178-192.
  • 5ELBAZ R, CHAMPAGNE D,LEE R B ,et al,Tec-tree: A low cost and parallelizable tree for efficient defense against memory replay attacks[C].In:CHES'07: Workshop on Cryptographic Hardware and Embedded Systems,2007:289- 302.
  • 6VASLIN R.Hardware core for off-chip memory security management in embedded system[D].Leuven:Katholieke Universiteit Leuven, 2008.
  • 7DURAHIM A O, SAVAS E, SUNAR B, et al.Transparent code authentication at the processor level[J].Comput Digital Techo , IET, 2009,3(4) : 354-372.
  • 8Zhong Jiling.Upper bound analysis and routing in optical benes networks[D].Atlanla,GA, Georgia State University, 2005.
  • 9Huang A.Hacking the Xbox:an introduction to reverse engi- neering[M].San Francisco,CA:No Starch Press,2003.
  • 10Yan C,Rogers B,Englender D, et al.Improving cost,per- formance, and security of memory encryption and authenti- cation[C]//Proc of the International Symposium on Com- puter Architecture,2006:1-12.

共引文献6

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部