Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing

Shuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.

Original languageEnglish
Title of host publicationProceedings - 2020 7th International Conference on Dependable Systems and Their Applications, DSA 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages246-250
Number of pages5
ISBN (Electronic)9780738124223
DOIs
StatePublished - Nov 2020
Event7th International Conference on Dependable Systems and Their Applications, DSA 2020 - Virtual, Xi�an, China
Duration: 28 Nov 202029 Nov 2020

Publication series

NameProceedings - 2020 7th International Conference on Dependable Systems and Their Applications, DSA 2020

Conference

Conference7th International Conference on Dependable Systems and Their Applications, DSA 2020
Country/TerritoryChina
CityVirtual, Xi�an
Period28/11/2029/11/20

Keywords

  • Cyber Security
  • Embedded Computing Platform
  • Trusted Computing
  • Virtualization

Fingerprint

Dive into the research topics of 'Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing'. Together they form a unique fingerprint.

Cite this