微处理器和计算机生命周期阶段的硬件漏洞管理

IF 2.1 Q2 ENGINEERING, MULTIDISCIPLINARY Inventions Pub Date : 2023-07-31 DOI:10.3390/inventions8040098
Ignat N. Bychkov, Irina Mikhailova, P. Korenev, Vitaliy Pikov, A. Ryapukhin
{"title":"微处理器和计算机生命周期阶段的硬件漏洞管理","authors":"Ignat N. Bychkov, Irina Mikhailova, P. Korenev, Vitaliy Pikov, A. Ryapukhin","doi":"10.3390/inventions8040098","DOIUrl":null,"url":null,"abstract":"This article discusses the topical issues of managing information security vulnerabilities in the life cycle stages of processors and computer equipment. An analysis of the experience of identifying vulnerabilities in the course of the joint design of the processor, computing module and computing complex was carried out. A number of actions have been developed and presented to ensure the control of hardware vulnerabilities in the development stage. The use of the binary translation technology of the Elbrus platform is proposed to prevent the execution of malicious software. A method has been developed to eliminate vulnerabilities in computer equipment for automated systems used for various purposes by using the Lintel binary translation system component. An experiment is described, the purpose of which was to successfully exploit the Meltdown vulnerability on a computer with an Elbrus processor. The experiment showed that, due to the peculiarities of the microarchitecture of Elbrus processors, the exploitation of Meltdown-type vulnerabilities is impossible.","PeriodicalId":14564,"journal":{"name":"Inventions","volume":" ","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Management of Hardware Vulnerabilities in the Life Cycle Stages of Microprocessors and Computers\",\"authors\":\"Ignat N. Bychkov, Irina Mikhailova, P. Korenev, Vitaliy Pikov, A. Ryapukhin\",\"doi\":\"10.3390/inventions8040098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article discusses the topical issues of managing information security vulnerabilities in the life cycle stages of processors and computer equipment. An analysis of the experience of identifying vulnerabilities in the course of the joint design of the processor, computing module and computing complex was carried out. A number of actions have been developed and presented to ensure the control of hardware vulnerabilities in the development stage. The use of the binary translation technology of the Elbrus platform is proposed to prevent the execution of malicious software. A method has been developed to eliminate vulnerabilities in computer equipment for automated systems used for various purposes by using the Lintel binary translation system component. An experiment is described, the purpose of which was to successfully exploit the Meltdown vulnerability on a computer with an Elbrus processor. The experiment showed that, due to the peculiarities of the microarchitecture of Elbrus processors, the exploitation of Meltdown-type vulnerabilities is impossible.\",\"PeriodicalId\":14564,\"journal\":{\"name\":\"Inventions\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":2.1000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inventions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3390/inventions8040098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inventions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/inventions8040098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

摘要

本文讨论了在处理器和计算机设备的生命周期阶段管理信息安全漏洞的热门问题。分析了在处理器、计算模块和计算复合体的联合设计过程中识别漏洞的经验。已经制定并提出了一系列行动,以确保在开发阶段控制硬件漏洞。提出使用Elbrus平台的二进制翻译技术来防止恶意软件的执行。已经开发了一种方法,通过使用Lintel二进制翻译系统组件来消除用于各种目的的自动化系统的计算机设备中的漏洞。描述了一个实验,其目的是成功利用带有Elbrus处理器的计算机上的Meltdown漏洞。实验表明,由于Elbrus处理器微体系结构的特殊性,不可能利用Meltdown类型的漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Management of Hardware Vulnerabilities in the Life Cycle Stages of Microprocessors and Computers
This article discusses the topical issues of managing information security vulnerabilities in the life cycle stages of processors and computer equipment. An analysis of the experience of identifying vulnerabilities in the course of the joint design of the processor, computing module and computing complex was carried out. A number of actions have been developed and presented to ensure the control of hardware vulnerabilities in the development stage. The use of the binary translation technology of the Elbrus platform is proposed to prevent the execution of malicious software. A method has been developed to eliminate vulnerabilities in computer equipment for automated systems used for various purposes by using the Lintel binary translation system component. An experiment is described, the purpose of which was to successfully exploit the Meltdown vulnerability on a computer with an Elbrus processor. The experiment showed that, due to the peculiarities of the microarchitecture of Elbrus processors, the exploitation of Meltdown-type vulnerabilities is impossible.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Inventions
Inventions Engineering-Engineering (all)
CiteScore
4.80
自引率
11.80%
发文量
91
审稿时长
12 weeks
期刊最新文献
Enhancing Smart Agriculture Monitoring via Connectivity Management Scheme and Dynamic Clustering Strategy Computer Vision Algorithm for Characterization of a Turbulent Gas–Liquid Jet A Modified Xception Deep Learning Model for Automatic Sorting of Olives Based on Ripening Stages Automatic Control and System Theory and Advanced Applications—Volume 2 Large-Scale BESS for Damping Frequency Oscillations of Power Systems with High Wind Power Penetration
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1