{"title":"基于RISC-V CPU的安全调试软件解决方案","authors":"Jun Liu, Ting Chong, Liangeng Liu, Xige Zhang","doi":"10.1145/3558819.3558823","DOIUrl":null,"url":null,"abstract":"When using the CPU chip containing the debug module, the mechanism of secure debug is required to ensure the security of the internal data in the CPU chip. But, the specification of RISC-V instruction architecture set only describes the guideline of secure debug mechanism for hardware aspect. This paper presents a software solution for the RISC-V CPU secure debug mechanism, and the configuration program on the host computer first creates the black box area configuration data and secure authentication data, then passes the data through the debug channel to the firmware on the chip, then the firmware authenticates the security data and writes the configuration data of the black box area. The solution is combined with RISC-V CPU secure debug of hardware characteristics, and provides a comprehensive implementation reference for RISC-V CPU secure debug.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Software Solution of Secure Debug Based on RISC-V CPU\",\"authors\":\"Jun Liu, Ting Chong, Liangeng Liu, Xige Zhang\",\"doi\":\"10.1145/3558819.3558823\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When using the CPU chip containing the debug module, the mechanism of secure debug is required to ensure the security of the internal data in the CPU chip. But, the specification of RISC-V instruction architecture set only describes the guideline of secure debug mechanism for hardware aspect. This paper presents a software solution for the RISC-V CPU secure debug mechanism, and the configuration program on the host computer first creates the black box area configuration data and secure authentication data, then passes the data through the debug channel to the firmware on the chip, then the firmware authenticates the security data and writes the configuration data of the black box area. The solution is combined with RISC-V CPU secure debug of hardware characteristics, and provides a comprehensive implementation reference for RISC-V CPU secure debug.\",\"PeriodicalId\":373484,\"journal\":{\"name\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3558819.3558823\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3558819.3558823","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software Solution of Secure Debug Based on RISC-V CPU
When using the CPU chip containing the debug module, the mechanism of secure debug is required to ensure the security of the internal data in the CPU chip. But, the specification of RISC-V instruction architecture set only describes the guideline of secure debug mechanism for hardware aspect. This paper presents a software solution for the RISC-V CPU secure debug mechanism, and the configuration program on the host computer first creates the black box area configuration data and secure authentication data, then passes the data through the debug channel to the firmware on the chip, then the firmware authenticates the security data and writes the configuration data of the black box area. The solution is combined with RISC-V CPU secure debug of hardware characteristics, and provides a comprehensive implementation reference for RISC-V CPU secure debug.