A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3

Author:

Kieu-Do-Nguyen Binh12ORCID,Nguyen Khai-Duy1ORCID,Dang Tuan-Kiet1ORCID,The Binh Nguyen12ORCID,Pham-Quoc Cuong2ORCID,Tran Ngoc-Thinh2ORCID,Pham Cong-Kha1ORCID,Hoang Trong-Thuc1ORCID

Affiliation:

1. Department of Computer and Network Engineering, The University of Electro-Communications (UEC), Tokyo 182-8585, Japan

2. Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), 268 Ly Thuong Kiet St., Dist. 10, Ho Chi Minh City 740050, Vietnam

Abstract

The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs. The nature of TEE is a continuous verification process with hashing, signing, and verifying. Such a process is called the Chain-of-Trust, derived from the Root-of-Trust (RoT). Typically, the RoT is pre-programmed, hard-coded, or embedded in hardware, which is locally produced and checked before booting. The TEE employs various cryptographic processes throughout the boot process to verify the authenticity of the bootloader. It also validates other sensitive data and applications, such as software connected to the operating system. TEE is a self-contained environment and should not serve as the RoT or handle secure boot operations. Therefore, the issue of implementing hardware for RoT has become a challenge that requires further investigation and advancement. The main objective of this proposal is to introduce a secured RISC-V-based System-on-Chip (SoC) architecture capable of securely booting a TEE using a versatile boot program while maintaining complete isolation from the TEE processors. The suggested design has many cryptographic accelerators essential for the secure boot procedure. Furthermore, a separate 32-bit MicroController Unit (MCU) is concealed from the TEE side. This MCU manages sensitive information, such as the root key, and critical operations like the Zero Stage BootLoader (ZSBL) and key generation program. Once the RoT is integrated into the isolated sub-system, it becomes completely unavailable from the TEE side, even after booting, using any method. Besides providing a secured boot flow, the system is integrated with essential crypto-cores supporting Transport Layer Security (TLS) 1.3. The chip is finally fabricated using the Complementary Metal–Oxide–Semiconductor (CMOS) 180 nm process.

Publisher

MDPI AG

Reference49 articles.

1. Quarkslab (2018). Introduction to Trusted Execution Environment: ARM’s TrustZone. Retrieved Oct., 8, 2019.

2. Oracle Corporation (2024, June 21). Working with UEFI Secure Boot. Available online: https://docs.oracle.com/en/operating-systems/oracle-linux/secure-boot/sboot-OverviewofSecureBoot.html#sb-overview.

3. Sabt, M., Achemlal, M., and Bouabdallah, A. (2015, January 20–22). Trusted Execution Environment: What It is, and What It is Not. Proceedings of the IEEE Trustcom/BigDataSE/ISPA (TrustCom), Helsinki, Finland.

4. Intel Corp (2018). Intel Software Guard Extensions (Intel SGX) Developer Guide, Intel Corp.

5. Costan, V., and Devadas, S. (2024, June 21). Intel SGX Explained. Cryptology ePrint Archive, Report 2016/086, January 2016. Available online: https://eprint.iacr.org/2016/086.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3