ÖÇÄÜÍøÁª V2X ϵͳÈÚºÏÁËÐÂÄÜÔ´¡¢5G ͨÐźÍÈ˹¤ÖÇÄܵȼ¼Êõ£¬¿ª·Å½ÓÈë»·¾³Ï´«Í³Æû³µÐÅÏ¢°²È«¼ì²â¼¼ÊõÃæÁÙ¸²¸ÇÃæ²»×ã¡¢°²È«±ß½çÄ£ºýµÈÌôÕ½¡£±¾±¨¸æÉîÈë·ÖÎöÁ˸´ÔÓ³¡¾°ÏÂÖÇÄÜÍøÁª V2XÔÚÊý¾Ý°²È«¡¢Ä£ÐͰ²È«ºÍÓû§°²È«·½ÃæµÄÖØÒªÐèÇóÓëÌôÕ½£¬ÊµÏÖ×ÔÊÊӦɨÃèÉøÍ¸¡¢¶Ô¿¹ÆÛÆ·ÀÓù¡¢Òþ˽·À»¤ÓÅ»¯¼¼Êõ£¬½¨Á¢ÖÇÄÜÍøÁª V2X °²È«²âÊÔÖ¸±êÌåϵ¼°²âÊԹ淶¡£Ö§³Ö¶ÔÖÇÄÜÍøÁª V2X ³µÆó¡¢³µÔØÏµÍ³¡¢Â·±ßµ¥ÔªµÈÊýÊ®ÖÖ¶ÔÏóµÄÒ»Ì廯°²È«²âÊÔ£»Ìá³ö¿çʱ¿Õ³ÖÐø¶ÈÁ¿Ä£ÐÍ£¬Ê¶±ð¹¥»÷×éºÏÌØÕ÷¡¢¸´ÏÖ¹¥»÷·¾¶£¬ÎªÖÇÄÜÍøÁª V2X ³¡¾°Ï嵀 APT ¹¥»÷·ÀÓùÌṩÓÐÁ¦Ö§³Å¡£
Ëæ×ÅÆû³µ¡°ÐÂËÄ»¯¡±µÄ¿ìËÙÍÆ½ø£¬ÒÔ¼°Æû³µ°²È«Ê¼þµÄ²»¶ÏÓ¿ÏÖ£¬ÐÅÏ¢°²È«ÒѾÉÏÉýΪÆû³µ¡°Ðµİ²È«µ×Ïß¡±¡£³µÔذ²È«Ð¾Æ¬ÊDZ£ÕÏÆû³µ°²È«µÄ×îµ×²ãÓ²¼þÔØÌ壬¶ÔÆä½øÐа²È«²âÆÀÓëÔöÇ¿³ÉΪÆû³µÐÅÏ¢°²È«ÖÐÖØÒªµÄ»·½ÚÖ®Ò»¡£±¾±¨¸æÊ×ÏÈ·ÖÎö³µÔذ²È«Ð¾Æ¬ÃæÁÙµÄÒÑÖªÓ²¼þ°²È«Íþв£¬Õë¶Ô·ÇÇÖÈëʽ¹¥»÷£¬Ìá³öÁ˺¸ÇоƬȫÉúÃüÖÜÆÚµÄ°²È«²âÆÀ·½°¸£¬ÒÔ¼°ÏàÓ¦µÄ°²È«ÔöÇ¿¼¼Êõ£»Õë¶ÔÇÖÈëʽ¼°¸´ºÏÐ͹¥»÷£¬Ìá³öÁËÈí¼þ¶¨ÒåÖ÷¶¯ÆÁ±Î²ã·À»¤Ìåϵ£¬ÎªÓ¦¶ÔÓ²¼þ°²È«ÍþвÌṩ¿ÉÄܵļ¼Êõ˼·£¬²¢½éÉÜ×îеÄÑо¿½øÕ¹Óë³É¹û¡£
Hardware security becomes a hot research topic recently with more and more researchers joining this area. Various hardware security tools are also developed. However, young/new hardware researchers can hardly benefit from the existing work. In the hardware domain, researchers may not share their tools either in the format of source code or in binary (different from the software domain where the culture of open-sourced tools becomes popular). The disadvantages are obvious. It becomes difficult to compare newly developed solutions with previous solutions. Building on top of existing methods for improvement also hits the obstacle if the tools are not released by the developers. A lack of hardware security benchmarks may also lead the researchers to mis- leading conclusions.Upon these challenges, the IEEE Hardware Security and Trust Technical Committee (HSTTC), along with the hardware security community, has initiated the https://CADforAssurance.org website. The CAD for Trust and Assurance website is an academic dissemination effort by researchers in the field of hardware security. The goal is to assemble information on all CAD for trust/assurance activities in academia and industry in one place and share them with the broader community of researchers and practitioners in a timely manner, with an easy-to-search and easy-to-access interface. We are including information on many major CAD tools the research community have developed over the past decade, including open-source license-free or ready-for-licensing tools, associated metrics, relevant publications and video-demos. So far, we have collected more than 60 CAD for Assurance tools, 6 hardware security benchmarks, and various SoC platforms for security evaluations.
Õë¶ÔÓ²¼þ²¢ÐÐʵÏֵķÖ×éÃÜÂë×öÄÜÁ¿·ÖÎö£¬Æä¶à¸ö S-box Ö®¼äµÄÄÜÁ¿ÐÅÏ¢»áÏ໥¸ÉÈÅ¡£È˹¤ÖÇÄÜÖеÄÒÅ´«Ëã·¨Ôø±»Ó¦ÓÃÓÚÄÜÁ¿·ÖÎöÀ´½â¾ö¸ÃÎÊÌ⣬µ«ÏÖÓзÖÎö·½·¨´æÔÚ¡°¾Ö²¿×îÓÅ¡±µÄȱÏÝ¡£±¾±¨¸æ·ÖÎöÁËÐγɾֲ¿×îÓŵÄÈýÖÖÓÕÒò£¬²¢¸ø³öÁËÒ»ÖÖͨÓõÄÒÅ´«Ëã·¨ÄÜÁ¿·ÖÎö¿ò¼Ü£¬½â¾öÁ˳õʼÖÖȺ»ùÒò²î¡¢½ø»¯ºóÆÚÊÕÁ²Âý¡¢´íÎóÊÕÁ²Èý¸öÎÊÌ⣬¿Ë·þÁ˾ֲ¿×îÓÅ£¬´Ó¶øÏÔÖøÌáÉýÁË·ÖÎöµÄ³É¹¦ÂÊ£¬²¢½µµÍÁËÀëÏß¼ÆËãµÄ¸´ÔÓ¶È¡£
½üÄêÀ´£¬»¥ÁªÍø¼¼ÊõÕý²»¶ÏÈںϴ«Í³ÐÐÒµ£¬¹¤Òµ»¥ÁªÍøÓ¦Ô˶øÉú¡£¹¤Òµ»¥ÁªÍø±êʶ½âÎöϵͳ£¬¿ÉΪÿһ¸ö²úÆ·¡¢Á㲿¼þ¼°»úÆ÷É豸ÌṩΨһµÄÉí·Ý±êʶ£¬ÊµÏÖ×ÊÔ´Çø·ÖºÍ¹ÜÀí¡£È»¶ø£¬´«Í³µÄ±êʶ½âÎöϵͳȱÉÙ¶Ô½ÓÈëʵÌåµÄÕæÊµÐÔÈÏÖ¤£¬¹¤Òµ»¥ÁªÍøÖÐÉ豸Éí·ÝαÔì¡¢·Ç·¨½ÓÈëµÈ°²È«ÎÊÌâØ©´ý½â¾ö¡£Òò´Ë£¬Õë¶ÔÉÏÊöÎÊÌ⣬½áºÏ¹¤Òµ»¥ÁªÍøÉ豸º£Á¿½ÓÈë¡¢ÍøÂçÒì¹¹¡¢ÖÖÀà¶àÑù¡¢×ÊÔ´ÊÜÏÞµÄÌØµã£¬Ìá³öÁË»ùÓÚ¿ÉÐŽÓÈ밲ȫ¼¼ÊõµÄ¿ÉÐÅÓ²¼þ£¬¸ÃÓ²¼þÀûÓà PUF ¼¼ÊõµÄÇáÁ¿»¯ÈÏÖ¤ÓÅÊÆ£¬ÔÚ±£Ö¤µÍ¿ªÏúµÄǰÌáϽ«É豸µÄÉí·ÝºÍ±êʶǿ°ó¶¨£¬±£Ö¤½ÓÈëÍøÂçÉ豸Éí·ÝµÄÕæÊµÐÔ¡£ÔÚ±êʶ½âÎöϵͳÖÐÓ¦ÓøÃÓ²¼þ£¬Îª±ßÔµÉ豸Ìṩ²»¿É´Û¸ÄÇÒÄÑÒÔαÔìµÄÎïÀíµØÖ·£¬ÓÐЧ½â¾öÁËÉè±¸ÕæÊµÐÔÈÏÖ¤µÄÄÑÌ⣬´Ó¶ø±£ÕϹ¤Òµ»¥ÁªÍø°²È«¡£
ÏÖÔڵĴ¦ÀíÆ÷¶¼Å䱸Á˵÷ÊÔ¹¦ÄÜ£¬ÒÔ·½±ã³ÌÐòµÄµ÷ÊԺͷÖÎö¡£¾¡¹Üµ÷ÊÔÌåϵ¼Ü¹¹ÒѾÌá³ö¶àÄ꣬µ«Êǵ÷ÊÔ¹¦ÄܵݲȫÐÔ»¹Ã»Óеõ½³ä·ÖµÄ¼ì²é£¬ÒòΪËüͨ³£ÐèÒªÎïÀí·ÃÎʲÅÄÜÔÚ´«Í³µÄµ÷ÊÔÄ£ÐÍÖÐʹÓÃÕâЩ¹¦ÄÜ¡£ Arm ÒýÈëÁËÒ»¸öеĵ÷ÊÔÄ£ÐÍ£¬¸ÃÄ£ÐÍ×Ô Armv7 ÒÔÀ´²»ÐèÒªÈκÎÎïÀí·ÃÎÊ¡£ÔÚÕâÖÖеĵ÷ÊÔÄ£ÐÍÖУ¬Ö÷»ú´¦ÀíÆ÷Äܹ»ÔÝÍ£ºÍµ÷ÊÔͬһоƬÉϵÄÁíÒ»¸öÄ¿±ê´¦ÀíÆ÷£¨´¦ÀíÆ÷¼äµ÷ÊÔ£©¡£¡°¶¤Ç¹¡±¹¥»÷µÄ˼ÏëÊÇÀûÓÃÕâÖÖ´¦ÀíÆ÷¼äµ÷ÊÔÄÜÁ¦£¬ÒòΪËüÔÊÐíµÍȨÏÞ´¦ÀíÆ÷ÔÝÍ£ºÍµ÷ÊÔ¸ßȨÏÞµÄÄ¿±ê´¦ÀíÆ÷¡£ ÎÒÃǵÄʵÑé·¢ÏÖÁËÐí¶àÒ×Êܹ¥»÷µÄÉ豸£¬°üÀ¨ Raspberry Pi ÕâÑùµÄÎïÁªÍøÉ豸¡¢ËùÓлùÓÚ Arm µÄÉÌÒµÔÆÆ½Ì¨£¬ÒÔ¼°»ªÎª¡¢Ä¦ÍÐÂÞÀºÍСÃ×µÈÒÆ¶¯µç»°¡£ÎªÁ˽øÒ»²½ÑéÖ¤£¬ÎÒÃÇÖ¤Ã÷Á˶¤Ç¹¹¥»÷¿ÉÒÔÓÃÓÚ·ÃÎÊRaspberry PI ÉϵݲȫÅäÖüĴæÆ÷£¨Ö»ÓÐÔÚ°²È«×´Ì¬Ï²ÅÄÜ·ÃÎÊ£©£¬²¢Ê¹Ó÷ǰ²È«ÄÚºËÄ£¿éÌáÈ¡´æ´¢ÔÚÊÖ»ú°²È«ÄÚ´æÖеÄÖ¸ÎÆÍ¼Ïñ¡£×îºó£¬ÎÒÃÇÌá³öÁËÒ»ÖÖ»ùÓÚ Arm ÐéÄ⻯¼¼ÊõµÄ·ÀÓùÊֶΣ¬ËüÄܹ»ÔÚµÍÐÔÄÜ¿ªÏúµÄÇé¿öÏ£¬ÓÐЧµÄµÖÓù¡°¶¤Ç¹¡±¹¥»÷¡£
ÔÚ¼ÓÃÜÉñ¾ÍøÂçÍÆÀíÖÐ,ÏßÐÔ²ãÒ»°ãÓÉ»ùÓÚ¸ñÃÜÂëµÄ̬ͬ¼ÓÃÜʵÏÖ. È»¶ø,Õë¶Ôµ¥Ò»Í¬Ì¬¼ÓÃܵÄÃÜÎÄÖеĶà¸öÃ÷ÎÄʵÏÖÏßÐԱ任ÐèÒªÖ´Ðи´Ô baby-step-giant-stepËã·¨ÒÔ¼°Éú³É×Ôͬ¹¹ÃÜÔ¿,µ¼ÖÂÒÑÓмÓÃÜÉñ¾ÍøÂçÍÆÀí·½°¸ÖÐÏßÐÔ²ãµÄ¼ÆËãËٶȽÏÂý. ±¾±¨¸æÌá³öÒ»ÖÖ»ùÓÚʱÓò¶àÏîʽ³Ë·¨µÄ̬ͬÏßÐԱ任·½°¸,²¢ÀûÓÃרÓõĽüËÆ FPGA ¼Ü¹¹À´ÊµÏÖÃÜÎÄÁìÓòµÄ¼ÆË㡣ʵÑé·¢ÏÖ, ÔÚ²»Ó°Ïì¼ÓÃÜϵͳµÄ°²È«ÐÔµÄÇé¿öÏÂ, ÀûÓÃרÓÃÓ²¼þʵÏֵļÓÃÜÏßÐԱ任±ÈÒÑÓз½°¸¿ì 3 ±¶ÒÔÉÏ, ͬʱ¼õÉÙÁË 10 µÄ 6 ´Î·½µÄÄܺġ£
Æû³µÕý±äµÃÔ½À´Ô½ÍøÁª»¯¡¢ÖÇÄÜ»¯£¬Í¨¹ý¸÷Àà³µÔØµç×ÓÄ£¿éºÍÍøÂç¼¼ÊõµÄÈÚºÏ £¬ ÔÚ ³µ Óë ³µ ¡¢ ³µ Óë · ¡¢ ³µ Óë ÈË ¡¢ ³µ Óë Íø£¨¼´£¬V2X£©Ö®¼ä¹¹³ÉÁËÅÓ´óµÄÏµÍ³ÍøÂç¡£Ëæ×Å¡°Èí¼þ¶¨ÒåÒ»ÇС±£¬³µÔصç×ÓÄ£¿é¡¢³µÔØÈí¼þ¡¢ÍøÂçµÈ¶¼ÓÉÒ»ÐÐÐÐÈí¼þ´úÂëÇý¶¯¶øÊµÏÖÆû³µ¸÷ÏÄÜ¡£È»¶ø£¬Èí¼þ´úÂëÒòÉè¼ÆÈ±ÏÝ¡¢±àÂë´íÎó¡¢²âÊÔ²»×ãµÈÔÒò¶øÔì³ÉµÄ°²È«È±ÏÝ£¬±Ø½«ÎªÖÇÄÜÍøÁªÆû³µµÄÍøÂ簲ȫ±£ÕÏÂñÏÂÒþ»¼¡£±¾ÒéÌâ´ÓÈí¼þ°²È«Êӽdzö·¢£¬½áºÏÍŶÓÔÚÈí¼þ°²È«ÁìÓòºÍÖÇÄÜÍøÂçÆû³µ°²È«ÁìÓòµÄÑо¿¾Ñ飬ÌÖÂÛÖÇÄÜÍøÂçÆû³µÍøÂ簲ȫ±£ÕϵÄ˼·ºÍ·½·¨¡£
ÏÖ´úÆû³µ³¯×ÅÖÇÄÜ»¯£¬ÍøÁª»¯µÄ·½Ïò·¢Õ¹£¬ÔÚ²»¶ÏÌáÉý¼ÝÊ»ÌåÑéµÄÍ¬Ê±Ò²ÃæÁÙ×ÅÑϾþµÄ°²È«ÐÎÊÆ¡£³µÁªÍø·þÎñÖУ¬Æû³µµÄÉí·ÝÒþ˽ÓëλÖÃÒþ˽±äµÃÓÈΪÃô¸Ð£¬´«Í³Òþ˽±£»¤·½°¸´æÔÚÐÔÄÜÎÊÌâ¡£Çø¿éÁ´¼¼Êõ¾ß±¸²»¿É´Û¸Ä£¬È¥ÖÐÐÄ»¯µÄÓŵ㣬¿ÉÒÔ×÷Ϊ³µÁªÍø·þÎñÖÐÒþ˽±£»¤·½°¸µÄµ×²ã¼¼Êõ¡£»ùÓÚÇø¿éÁ´¹¹Ôì¸÷³¡¾°ÏµijµÁªÍøÒþ˽±£»¤·½°¸³ÉΪһÖÖDZÔڵĽâ¾ö·½°¸¡£
Ìá¸Ù£ºÒ»¡¢Ñо¿±³¾°¼°ÒâÒ壻¶þ¡¢PUFоƬ¼¼ÊõÃæÁÙµÄÌôÕ½£»Èý¡¢½üÆÚ´ú±íÐÔѧÊõ³É¹û£»ËÄ¡¢PUF·¢Õ¹Ç÷ÊÆ
µ±Ç°£¬Ð¾Æ¬¿É¿¿Ó밲ȫÎÊÌâÔÚº½¿Õº½ÌìµÈ¹ú¼ÒÕ½ÂÔÁìÓò±¸ÊÜÖØÊÓ¡£Ëæ×ÅÖÇÄÜÎïÁªÍøÊ±´úµÄµ½À´£¬Æû³µµç×ӵȸßм¼ÊõÁìÓò£¬¶ÔоƬµÄ¿É¿¿Ó밲ȫÌá³öÁ˸ü¸ßÒªÇó¡£ÂÛ̳½«´Ó¿É¿¿ºÍ°²È«Á½¸öά¶È£¬Õë¶ÔÎïÁªÍøºÍÆû³µµç×ÓÁ½ÀàµäÐÍÓ¦Óã¬Ì½ÌÖ¿ÉÐÅоƬµÄÉè¼ÆÓë²âÊÔ¼¼Êõ¡£ÌØÑûר¼Ò½«Õë¶ÔÒÔÏÂÎÊÌâ·ÖÏí¹Ûµã£ºÈçºÎÉè¼ÆºÁÍß¼¶³¬µÍ¹¦ºÄÉñ¾ÍøÂç´¦ÀíÆ÷£¬½«È˹¤ÖÇÄÜÆÕ¼°µ½Òƶ¯ÓëÎïÁªÍøÉ豸£»ÖÇÄÜÆû³µÐ¾Æ¬µÄ¿É¿¿ºÍ°²È«¼¼ÊõÒªÇó£¬ÒÔ¼°¶ÔÆû³µÐ¾Æ¬¶ÌȱÎÊÌâµÄÈÏʶºÍ˼¿¼£»PUFоƬ°²È«¼¼ÊõÃæÁÙÄÄЩ»úÓöÓëÌôÕ½£»»úÆ÷ѧϰ¼¼ÊõÔÚоƬ²âÊÔÖеÄÓ¦Óã»ÐÂʱ´úÆóÒµµÄËãÁ¦½â¾ö·½°¸¼°¿ÉÐżÆËãʵ¼ùµÈ¡£
оƬ°²È«ÊǼÆËã»úϵͳ°²È«µÄ»ùʯ£¬¿ÉÐżÆËãÊǽ¨Á¢ÏµÍ³ÄÚÉú°²È«µÄÓÐЧÊֶΡ£½üÄêÀ´£¬¹ú¼ÊÉÏÖ÷Á÷CPU²úÉ̶¼ÍƳöÁËÓ²¼þÖ§³ÅµÄ¿ÉÐÅÖ´Ðл·¾³(TEE)£¬ÈçIntel SGX¡¢AMD SEV¡¢Arm TrustZoneµÈ£»¿ªÔ´RISC-V¶ÔTEEÒ²¸ß¶ÈÖØÊÓ£»¹úÄÚÁúо¡¢·ÉÌÚµÈоƬ³§ÉÌÒ²¿ªÊ¼ÔÚ¹ú²úCPUоƬÖÐÄÚÖð²È«»úÖÆ£¬ÈçPSPAµÈ¡£ÕâЩ¿ÉÐÅÖ´Ðл·¾³µÄÓÅȱµã·Ö±ðÊÇʲô£¿Êµ¼Ê°²È«ÌØÐÔÈçºÎ£¿ÄܵÖÓù»ùÓÚÍÆ²âÐÔÖ´ÐÐ(ÈçÈ۶ϺÍÓÄÁé)¡¢²àÐŵÀ¹¥»÷µÈÐÂÐ͹¥»÷Â𣿴ËÂÛּ̳ÔÚ¶ÔоƬÄÚÉú°²È«»úÖÆºÍÏÂÒ»²½·¢Õ¹·½Ïò½øÐÐÉî¶ÈÆÊÎö£¬ÑûÇë¹úÄÚÍâÖªÃûоƬ°²È«×¨¼Ò·ÖÎö²»Í¬ÀàÐ͵ÄTEE£¬ÑÐÌÖÏÖÓи÷ÀàÌåϵ¼Ü¹¹ÉÏÓ²¼þÐͬTEEµÄÓÅȱµã£¬¶ÔÉè¼ÆÏÂÒ»´úTEEÌá³ö½¨Ò飬Ϊ¹¹½¨¹ú²úCPUµÄÏȽøÄÚÉú°²È«»úÖÆºÍ¹¹½¨¹ú²ú¿ÉÐżÆËã²úÒµ»·¾³ÌṩÓÐÁ¦Ö§³Å¡£
Meltdown/Spectre¡¢Rowhammer µÈÐÂÐÍÓ²¼þ°²È«Â©¶´ÒÔ¼°°²È«Â©¶´ÊýÁ¿µÄ²»¶ÏÔö´óʹµÃµ±Ç°²Ù×÷ϵͳϵͳµÈÃæÁÙ¾Þ´óµÄ°²È«Íþв¡£±¨¸æ»Ø¹ËÁ˵±Ç°²Ù×÷ÏµÍ³ÃæÁٵݲȫÌôÕ½£¬·ÖÎöÁ˵±Ç°Ó²¼þµÄ°²È«À©Õ¹ÒÔ¼°´øÀ´µÄ°²È«ÌáÉý»ú»á£¬²¢½éÉÜÁ˵±Ç°¹ú¼ÊѧÊõ½çÒÔ¼°ÉϺ£½»´ó IPADS ÍŶÓÔÚÈíÓ²¼þÐͬ°²È«ÌáÉý·½ÃæµÄһϵÁй¤×÷£¬×îºóÕ¹ÍûÁËδÀ´µÄÑо¿»úÓöÓëÌôÕ½¡£
´Ó¼¯³Éµç·¹©Ó¦Á´³ö·¢£¬·ÖÎöоƬÉè¼ÆÖÐËùÃæÁٵݲȫÎÊÌ⣬̽ÌÖ¡°Ð»ù½¨¡±Ê±´úµÄ×ÔÖ÷¿É¿ØÓëÓ²¼þ°²È«ÃæÁÙµÄÌôÕ½ºÍ¼¼Êõ;¾¶¡£