Visible to the public Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing

TitleEmbedded Virtualization Computing Platform Security Architecture Based on Trusted Computing
Publication TypeConference Paper
Year of Publication2020
AuthorsShuang, Zhang, Xinyu, Wan, Deqi, Kong, Yangming, Guo
Conference Name2020 7th International Conference on Dependable Systems and Their Applications (DSA)
KeywordsComputer architecture, cyber security, Embedded Computing Platform, Hardware, Metrics, multicore computing security, Multicore processing, pubcrawl, resilience, Resiliency, Scalability, security, Trusted Computing, trusted platform modules, Virtual machining, virtualization
AbstractWith the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.
DOI10.1109/DSA51864.2020.00043
Citation Keyshuang_embedded_2020