论文标题
在嵌入式系统中建立网络弹性,以确保下一代关键基础设施
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
论文作者
论文摘要
在关键的商业,工业和公共环境中,智能技术的大规模整合和部署对整个业务运营和社会都有重大影响。尽管这些关键智能技术的集成对技术制造商构成了严重的嵌入式安全挑战,这些挑战必须与国际安全法规结合系统地进行。本文通过得出嵌入式安全要求来实现国际安全当局提出的核心安全功能,并提出微体系式特征以在嵌入式系统中建立网络弹性,从而为此类智能技术建立了安全基础。为了弥合嵌入式和操作安全域之间的研究鸿沟,提出了对现有嵌入式安全方法,微体系结构和设计实践的详细审查。现有的嵌入式安全方法已被发现,被动,并且强烈依赖于建立和维持信任。据我们所知,迄今为止,一旦信任破裂,现有的嵌入式安全微体系结构或防御机制都没有提供数据流或安全性的连续性。该功能对于部署在关键基础架构中以增强和维持安全性的嵌入式技术至关重要,并获得了安全漏洞以有效评估,改善和部署主动响应和缓解策略的证据。为此,本文提出了三个微体系特征,应设计并集成到嵌入式体系结构中,以建立,维护和提高嵌入式系统的网络弹性,以实现下一代关键基础设施。
The mass integration and deployment of intelligent technologies within critical commercial, industrial and public environments have a significant impact on business operations and society as a whole. Though integration of these critical intelligent technologies pose serious embedded security challenges for technology manufacturers which are required to be systematically approached, in-line with international security regulations. This paper establish security foundation for such intelligent technologies by deriving embedded security requirements to realise the core security functions laid out by international security authorities, and proposing microarchitectural characteristics to establish cyber resilience in embedded systems. To bridge the research gap between embedded and operational security domains, a detailed review of existing embedded security methods, microarchitectures and design practises is presented. The existing embedded security methods have been found ad-hoc, passive and strongly rely on building and maintaining trust. To the best of our knowledge to date, no existing embedded security microarchitecture or defence mechanism provides continuity of data stream or security once trust has broken. This functionality is critical for embedded technologies deployed in critical infrastructure to enhance and maintain security, and to gain evidence of the security breach to effectively evaluate, improve and deploy active response and mitigation strategies. To this end, the paper proposes three microarchitectural characteristics that shall be designed and integrated into embedded architectures to establish, maintain and improve cyber resilience in embedded systems for next-generation critical infrastructure.