½²Ê¦²©ÎÄ
ǶÈëʽ´¦ÀíÆ÷ÃæÁÙ²àͨµÀ¹¥»÷ À´Ô´ : Ô­´´     2020-05-22

¹¤³Ì½çºÍÆÕͨÃñÖÚÔçÒÑϰ¹ßÁËΪÐÞ²¹ÈíÌå©¶´¶øÆµ·±¸üÐÂApp»ò°²×°×÷ҵϵͳ²¹¶¡¡£¶øÕâÀïËù˵µÄ²»Í¬£¬×ï¿ý»öÊ×ÊÇÓ²Ì壬¶øÓ²Ìå¸üпɲ»±ãÒË¡£ÐÞ²¹Ó²Ìå©¶´Î¨Ò»¿ÉÐеķ½·¨ÊÇ·¢²¼ÐµÄÈíÌ壬ÒÔ½µµÍϵͳËÙ¶ÈÓëÄÜЧΪ´ú¼Û£¬ÕÚ±ÎÒ×Êܹ¥»÷µÄÓ²Ì幦ÄÜ»ò±ÜÃâʹÓÃËüÃÇ£¬MeltdownºÍSpectreµÄ·¢ÏÖÒý·¢ÁËһϵÁÐÕë¶ÔÓ²Ì尲ȫµÄµ÷²é¡£

½ØÖÁĿǰ£¬°²È«Ñо¿ÈËÔ±ÒѾ­¹«²¼Á˸ü¶àµÄÓ²Ìå©¶´£¬°üÀ¨Foreshadow¡¢ZombieLoad¡¢RIDLºÍFallout¡£ÕâЩӲÌåȱÏÝΣ¼°¸öÈ˵çÄÔ¡¢ÖÇ»ÛÐÍÊÖ»úÉõÖÁÔÆ¶ËµÄ°²È«ÐÔ¡£

ͼ1 ¹¥»÷Õß½ø³Ì͸¹ý»ùÓÚÐÐÌî³ä»º³åÇø(LFB)µÄ΢¼Ü¹¹²àͨµÀ´ÓÊܺ¦Õß½ø³ÌÖÐÇÔÈ¡»úÃÜ×ÊÁÏ¡£Êܺ¦Õߺ͹¥»÷Õß½ø³Ì´¦ÓÚ²»Í¬µÄ°²È«ÓòÖС£(×ÊÁÏÀ´Ô´£ºS. van SchaikµÈÈË£¬RIDL£ºRogue In-Flight Data Load)

ÄÇǶÈëʽϵͳÊÇ·ñ¾Í°²È«ÁËÄØ£¿

Î§ÈÆ×Å´¦ÀíÆ÷µÄ°²È«ÐÔ©¶´ÓÐÒ»¸ö¹²Í¬Ö÷ÌâÊÇËüÃǶ¼Õë¶Ô¾ßÓÐÏȽøÐÔÄÜ×î¼Ñ»¯µÄÏÖ´ú¸ß½×ʵÏÖ¹¦ÄÜ£¬ÊÂʵ֤Ã÷£¬ÕâЩÏȽø¹¦ÄÜ¿ÉÄܱ»¶ñÒâÄ¿µÄÀûÓá£

¶øÇ¶Èëʽϵͳͨ³£²ÉÓÃÏà¶Ô¼òµ¥µÄ´¦ÀíÆ÷ʵÏÖ¡£ËüÊÇÒ»¸ö·â±ÕµÄ»·¾³£¬¹©Ó¦ÉÌÓ¦¸Ã¿ÉÒÔ¸üÑϸñµØ¿Ø​​ÖÆËü¡£Êµ¼ÊÉÏ£¬ÔÚDVCon US 2019»áÒéÉÏ£¬ÔÚ¿ª·ÅʽָÁ¼Ü¹¹(ISA)µÄÑéÖ¤ºÍºÏ¹æÐÔÌÖÂÛʱÕâ¸öÎÊÌâÒѾ­±»Ìá³öÀ´¡£¿ª·ÅʽISA£¬ÌرðÊÇRISC-V£¬ÒÔ¼°MIPSµÈ£¬ÌṩÓÅÓÚרÓмܹ¹µÄÓÅÊÆ£¬Ô½À´Ô½Êܵ½°ëµ¼Ìå²úÒµºÍǶÈëʽÉ豸ÉçÇøµÄ¹Ø×¢¡£

ǶÈëʽ´¦ÀíÆ÷±»Ó¦ÓÃÓÚÐí¶àÁ¬ÍøÏµÍ³£¬ÀýÈ繤³§¡¢ÖǻۼҾӡ¢ÎïÁªÍø(IoT)É豸¡¢Ò½ÁÆÉ豸ºÍÏû·Ñµç×Ó²úÆ·£¬ÒÔ¼°×Ô¶¯¼ÝÊ»¡¢·É»úºÍÆäËûÉúÃü°²È«Øü¹Ø¹Ø¼üÓ¦Óá£

²»Í¬ÓÚÆÕ±éµÄ¿´·¨£¬Ç¶Èëʽƽ̨ÉÏÖ´ÐеÄÈíÌåÀ´×Ô¶à¸öͨ³£²»¿ÉÐŵÄÀ´Ô´£¬ÀýÈçÄÇЩÔÊÐíʹÓÃÕßÖ´ÐÐЭÁ¦³§ÉÌÓ¦ÓóÌʽ»òÔË×÷À´×Ô¶à¸ö¹©Ó¦É̺Ϳª·ÅԭʼÂë¿âµÄ´óÐÍÈíÌå¶Ñµþƽ̨¡£ÎªÁË×î´ó»¯Ó²ÌåÀûÓÃÂʲ¢½µµÍ³É±¾£¬¹Ø¼üºÍ·Ç¹Ø¼üÓ¦ÓóÌʽÔÚͬһÎïÀí´¦ÀíÆ÷ÉÏÔË×÷¡£ÀýÈ磬Æû³µµç×Ó¿ØÖƵ¥Ôª(ECU)¿ÉÒÔÔÚͬһ´¦ÀíÆ÷ºËÐÄÉÏÖ´ÐÐ×ÊѶÓéÀÖ³ÌʽÂ룬ÒÔ¼°°²È«Ïà¹Ø¹¦ÄÜ¡£

Ö±µ½×î½ü£¬°²È«·À»¤»¹Ö÷Òª¼¯ÖÐÔÚÈíÌå¶ÑµþÉÏ£¬ÆäÓ²ÌåÌṩÖîÈçÐÅÈθùµÄµ×²ã·À»¤¹¦ÄÜ¡£RISC-V»ù½ð»á½«¾«Á¦Ö÷Òª·ÅÔÚ°²È«Æ½Ì¨ºÍ»úÖÆµÄʵÏÖÉÏ£¬ÒÔ·ÀÖ¹²»ÊÜÐÅÈεijÌʽÂëÓ°Ïì¹Ø¼üϵͳ¹¦ÄܵÄÍêÕûÐÔ¡£ÕâЩ°²È«¹¦ÄܶÔÓÚÑéÖ¤ÈíÌå¸üÐÂÖÁ¹ØÖØÒª£¬´ÓÀíÂÛÉϽ²£¬ÕâЩ·½·¨Ã»ÓÐÎÊÌ⣬²»ÊÜÐÅÈεÄÈíÌåÖ»ÄÜÔÚ¶¨ÒåºÃµÄ±£»¤¿ÇÄÚÔË×÷£¬ÎÞ·¨Í»ÆÆ»òÇÔÈ¡°²È«ÇøÓòµÄÃô¸Ð×ÊѶ¡£

©¶´²¢·Ç¸ß½×´¦ÀíÆ÷¶ÀÓÐ

²»ÐÒµÄÊÇ£¬»¹ÓÐÒ»¸ö¸´ÔÓµÄÎÊÌâ¡£

×î½ü£¬µçÄÔ¿ÆÑ§¼Ò¹«²¼ÁËÒ»ÖÖÐÂÐ͹¥»÷£¬³ÆÎªOrc¹¥»÷£¬ËüÍþвµ½Ç¶ÈëʽӦÓÃÖг£Óõļòµ¥´¦ÀíÆ÷¡£×îÖØÒªµÄÊÇ£¬¸Ãƪ±¨¸æ×÷ÕßÒѾ­Ö¤Ã÷£¬ºÜСµÄʵʩ¾ö²ß¿ÉÄÜ»á²úÉú»òÕß·ÀÖ¹ÑÏÖØµÄÓ²Ìå©¶´¡£¡¸ÕâÀïµÄ¹Ø¼üµãÔÚÓÚ£¬¼´Ê¹ÊǼòµ¥µÄÉè¼Æ²½Ö裬ÀýÈçÌí¼Ó»òɾ³ý»º³åÇø£¬²»¾­Òâ¼äÒ²¿ÉÄÜÔÚÈκδ¦ÀíÆ÷ÖÐÒýÈëÒþ±ÎͨµÀ©¶´£¬¡¹·¢ÏÖOrc¹¥»÷µÄKaiserslautern-StanfordÍŶӳÉÔ±Mo Fadiheh˵¡£

×îÖյĽá¹ûÊÇ£¬OrcºÍ²àͨµÀ¹¥»÷´òÆÆÁËÌØÈ¨¼¶ºÍÓû§¼¶ÓòÖ®¼äµÄ¸ôÀë¡£¼ÓÃܺͰ²È«ÑéÖ¤¿ÉÒÔ±»ÈÆ¿ª£¬¶ñÒâ´úÀí³Ìʽ¿ÉÒÔÍÆ¶Ï³öÃØÃÜ×ÊÁÏ£¬°üÀ¨ÃÜÂë¡¢Éç»á°²È«ºÅÂëºÍÒ½ÁƼǼ£»±©Â¶ÓÃÓÚÑéÖ¤ÈÍÌå¸üеĽðÔ¿¿ÉÄÜÔÊÐí¹¥»÷ÕßÔØÈë×Ô¼ºµÄ³ÌʽÂë²¢ÒÔ¸ü¸ßµÄÐí¿ÉȨִÐÐËü»òÌæ»»×÷ҵϵͳÖеÄijЩ¹¦ÄÜ£»ÓÃÓÚDoS¹¥»÷µÄºóÃÅ»òÖÕÖ¹¿ª¹Ø¿ÉÄܱ»Ìí¼Ó£»»¹ÓÐÎÞÊýµÄ¿ÉÄÜÐÔ¡£¡¸´ÓÀíÂÛÉϽ²£¬º§¿Í¿ÉÒÔʹÓÃOrc©¶´À´¿ØÖÆ×Ô¶¯¼ÝÊ»³µ»òÕßÕ÷ÓÃÎïÁªÍøÉÏÁ¬ÍøµÄµçÄÔ£¬¡¹Ê·µ¤·ð´óѧ(Stanford University)µç×Ó¹¤³ÌºÍµçÄÔ¿ÆÑ§½ÌÊÚ¡¢Kaiserslautern-StanfordÍŶӳÉÔ±Subhasish Mitra˵¡£

Òµ½çÒѾ­Òâʶµ½ÁËÕâЩ·çÏÕ£¬²¢ÕýÔÚ»ý¼«Ñ°Çó½â¾ö·½°¸¡£ÀýÈ磬Ӣ·ÉÁè(Infineon)¾Í²ÎÓëÁË·¢ÏÖOrc©¶´µÄÑо¿¹¤×÷¡£

·ÀÖ¹Ó²Ìå©¶´µÄϵͳ·½·¨

Ö¤Ã÷΢¼Ü¹¹²àͨµÀ²»´æÔںܸ´ÔÓ¡£Ó²Ì尲ȫÑéÖ¤²»½ö½öÊÇÈ·±£ÕýȷʵʩISA°²È«¹¦ÄÜ£¬¿ª·¢ºÍ·ÖÎöÍþвģÐÍÒ²ÊDz»¹»µÄ£¬ÒòΪ¹¥»÷³¡¾°ÐèÒª±»Ìáǰ±æÊ¶¡£

·¢ÏÖOrc©¶´µÄͬһ¸öÍŶӷ¢Ã÷ÁËÒ»ÖÖÇ¿´óµÄ·½·¨¿ÉÒÔÔÚ´ó¹æÄ£Éú²úºÍ²¿ÊðIC֮ǰ¼ì²âÉè¼Æ¹ý³ÌÖеÄÓ²Ìå©¶´£¬Õâ¾ÍÊÇΨһ³ÌʽִÐмì²é(UPEC)£¬Ëü¿ÉÒÔϵͳµØ¼ì²âÀ´×Ô´¦ÀíÆ÷΢¼Ü¹¹ºÍ½ÏСʵʩ¾ö²ßÖеÄ©¶´¡£

¡¸Orc©¶´µÄ³öÏÖ·´Ó³³ö£¬¾§Æ¬Éè¼ÆÊ¦Ã¿Ìì¶¼»á×ö³öµÄ¿´ËÆÎÞº¦µÄÉè¼Æ¾ö²ß£¬µ«¿ÉÄܻᵼÖÂÑÏÖØµÄȱÏÝ£¬¡¹Íþ˹¿µÐÁ´óѧÂóµÏÑ··ÖУ(University of Wisconsin-Madison)½ÌÊÚ¡¢µçÄԼܹ¹×¨¼ÒMark D. HillÖ¸³ö¡£¡¸Í¸¹ýUPEC£¬Éè¼ÆÈËÔ±¿ÉÒÔ¸ü¼Ó×ÔÐŵط¢ÏÖ²¢Ïû³ýÉè¼ÆÖÐËùÓÐDZÔÚµÄÒþ±ÎͨµÀȱÏÝ¡£¡¹

ǶÈëʽϵͳÐèÒª¸ßÍêÕûÐÔµÄIC

ÔÚǶÈëʽϵͳÖУ¬²»Ì«¿ÉÄÜÍêÈ«ÐÅÈκͿØÖÆÈíÌå¶ÑµþµÄËùÓв㡣Òò´Ë£¬¼´Ê¹Ê¹Óüòµ¥µÄ´¦ÀíÆ÷ºËÐÄ£¬ÀûÓÃÓ²ÌåʵÏÖÖЩ¶´ÊµÊ©µÄ΢¼Ü¹¹²àͨµÀ¹¥»÷Ò²»á¶Ô°²È«Ôì³ÉÕæÕýµÄÍþв¡£

»ùÓÚRISC-V ISAµÄ¿ª·ÅԭʼÂëÓ²ÌåΪ¸ü¸ß¼¶±ðµÄ°²È«Éó²éÌṩÁË»ú»á¡£µ«Í¬Ê±£¬¶ñÒâ´úÀíÈíÌåÒ²¿ÉÒÔ¶ÔÉè¼ÆÖ´ÐÐÏêϸ·ÖÎö²¢·¢Ïֵͼ¶Â©¶´¡£

ͼ2 ³ýһЩÊܱ£»¤µÄÃØÃÜ×ÊÁÏÍ⣬UPEC´´½¨°üº¬Ïàͬ×ÊÁϵÄͬһÔËËãϵͳµÄÁ½¸öʵÀý¡£»ùÓÚÐÎʽÑéÖ¤µÄ·ÖÎö½ÒʾÁËÊÇ·ñÓпÉÄܹ¹½¨³ÌÐòÔÚδ±»ÊÚȨ·ÃÎÊÃØÃÜ×ÊÁϵÄÇé¿öÏÂÔÚÁ½¸öϵͳÖÐÒÔ²»Í¬µÄ·½Ê½Ö´ÐС£(×ÊÁÏÀ´Ô´£ºMR FadihehµÈÈË£¬Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking¡£)

¶øÇÒǶÈëʽÉ豸һµ©²¿Ê𣬸ü»»´¦ÀíÆ÷¾ÍºÜÀ§ÄÑÇҳɱ¾¸ß°º¡£ËùÒÔ£¬Ìæ´ú·½°¸¾ÍÊÇÔÚ²¿Êð֮ǰ¼´±æÊ¶Ó²Ìå©¶´À´·ÀÖ¹²àͨµÀ¹¥»÷¡£UPECÊÇÒ»ÖÖÇ¿´óµÄÓ²Ì尲ȫÑéÖ¤¼¼Êõ£¬Æä»ùÓÚÐÎʽÑéÖ¤µÄÊôÐÔ¼ì²é£¬¿ÉÒÔϵͳµØ±æÊ¶Ó²Ìå¼Ä´æÆ÷´«Êä²ã(RTL)Éè¼ÆÄ£ÐÍÖеÄ©¶´£¬¶ø²»ÓÃÒÀ¿¿×¨ÒµÖªÊ¶À´²Â²â¿ÉÄÜ´æÔÚµÄÎÊÌâ¡£

µ±Ç°UPECµÄʵʩÊÇÀûÓÃOneSpin SolutionsÌṩµÄICÍêÕûÐÔÀ´±£Ö¤²úÆ·¹¹½¨¡£×ÊÁϰ²È«ÐÔ(Security)ÊÇICÍêÕûÐԵĻùʯ£¬µ±È»»¹ÓÐÐÅÈΡ¢¹¦ÄÜÕýÈ·ÐÔºÍÉúÃü°²È«ÐÔ(Safety)¡£¸÷ÖÖÒòËØÏศÏà³É£¬ÀýÈ簲ȫÐÔ©¶´»òÓ²ÌåľÂí¿ÉÄÜ»áΣ¼°×Ô¶¯¼ÝÊ»³µµÄ°²È«ÐÔ¡£¿É¼û£¬ICÍêÕûÐÔ¶ÔÈç½ñµÄÊýλÊÀ½çÖÁ¹ØÖØÒª¡£

ɨÂëÉêÁì±¾µØÇ¶Èëʽ½Ìѧʵ¼ȫÌ×ÊÓÆµ¼°ÅäÌ×Ô´Âë

ÉÏһƪ£ºSTM32¶¼Ñ§Ê²Ã´

ÏÂһƪ£ºÇ¶ÈëʽÊÓ¾õ½«³ÉΪ»®Ê±´úµÄ²úÆ·

400-611-6270

Copyright © 2004-2024 »ªÇåÔ¶¼û½ÌÓý¿Æ¼¼¼¯ÍÅ °æÈ¨ËùÓÐ
¾©ICP±¸16055225ºÅ-5£¬¾©¹«º£Íø°²±¸11010802025203ºÅ