您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [中移智库]:基于RISC-V指令集架构的智能卡处理器核安全技术白皮书 - 发现报告

基于RISC-V指令集架构的智能卡处理器核安全技术白皮书

信息技术 2025-09-30 - 中移智库 程思齐Sophie
报告封面

发布单位:中移智库 编制单位:中国移动通信研究院、中国网络安全审查认证和市场监管大数据中心、RISC-V工作委员会、北京银联金卡科技有限公司、北京中电华大电子设计有限责任公司、芯来智融半导体科技(上海)有限公司、芯昇科技有限公司、深圳市中兴微电子技术有限公司、北京开源芯片研究院 目次 I前言.....................................................................................................................................................................11概述.....................................................................................................................................................................22技术架构.............................................................................................................................................................32.1取指单元................................................................................................................................................32.2流水线控制单元....................................................................................................................................42.3执行单元................................................................................................................................................42.4访存单元................................................................................................................................................42.5物理内存保护........................................................................................................................................42.6物理内存属性........................................................................................................................................52.7总线接口单元........................................................................................................................................52.8中断控制器............................................................................................................................................52.9触发单元................................................................................................................................................52.10调试单元..............................................................................................................................................62.11安全机制...............................................................................................................................................63安全威胁.............................................................................................................................................................63.1信息泄露................................................................................................................................................63.2故障利用................................................................................................................................................63.3篡改攻击................................................................................................................................................73.4逻辑攻击................................................................................................................................................73.5生命周期功能滥用................................................................................................................................74安全要求.............................................................................................................................................................74.1防攻击要求............................................................................................................................................74.1.1防止信息泄露利用攻击............................................................................................................74.1.2防止故障注入攻击....................................................................................................................84.1.3防止篡改攻击............................................................................................................................84.1.4防止逻辑攻击............................................................................................................................84.1.5防止生命周期功能滥用攻击....................................................................................................84.2安全增强功能........................................................................................................................................94.2.1内存泄露管控(MemoryLeakageControl)........................................................................104.2.2状态清洗(StateClearing)...................................................................................................104.2.3权限分级(PrivilegeLevelClassification)..........................................................................104.2.4地址分区访问控制(AddressPartitionAccessControl)....................................................104.2.5存储数据保护(StoredDataProtection).............................................................................114.2.6内部状态监控(InternalStateMonitoring).........................................................................114.2.7安全配置锁定(SecurityConfigurati