成果報告書詳細
管理番号20160000000738
タイトル*平成27年度中間年報 戦略的イノベーション創造プログラム(SIP)/重要インフラ等におけるサイバーセキュリティの確保 (a1)制御・通信機器のセキュリティ確認技術
公開日2016/8/23
報告書年度2015 - 2015
委託先名日本電信電話株式会社
プロジェクト番号P15011
部署名IoT推進部
和文要約
英文要約Development item: R&D project on security confirmation technologies for control and communication devices

R&D Overview, results
Research and development on technologies that enable to confirm device securities in terms of authenticity and integrity in an effective and an efficient manner during system operation phase as well as system shipment and installation phases were carried out. These technologies consist of the following three development items

 1. R&D on a platform for authenticity and integrity confirmation based on the technology to secure the root of trust.
Past activities on relevant technologies have a limited scope , in other words, did not develop a system which considers software lifecycle and system scalability. Therefore, we studied, using a trust chain, an integrity confirmation system which possesses its lifecycle and system scalability.
In 2015, a functional requirement document for the prototype was developed so as to confirm the feasibility of the trust chain.
Study key aspects:
Completion of basic work requirement description for security confirmation from viewpoints on cyber security operations and lifecycle management of control and communication equipment;
Completion of functional requirements description for the prototype based on the concept of proposed security confirmation technologies, which satisfy above mentioned work requirements.

 2. R&D for the configuration method of the technology to secure the root of trust to realize authenticity and integrity confirmation
The configuration method of the technology was studied. The method is used to confirm authenticity and integrity throughout the whole system and its lifecycle.
In 2015, a functional requirement document for the prototype was developed.
Study key aspects:
・Considering the system lifecycle, data items were extracted and operations for each item and security function being realized for the technology were studied
・Studies on considerable architecture and its implementation conditions on hardware, software and performance were carried out as well as internal research. Then, necessary knowledge for the design scheduled in next year was obtained and accumulated.

 3. R&D of inspection technology for threats against the technology to secure the root of trust based authenticity and integrity confirmation function
An integrity confirmation function is valid for objects on a hard disc but not for objects on memory. Therefore, vulnerability attack to programs on memory may cause threats which include functional loss of the root of trust and unauthorized operation of equipment
As a solution to these issues, inspection technologies which include (1) Confirmation technology for retaining authenticity and integrity confirmation functions in equipment which installs the technology to secure the root of trust, and (2) Vulnerability inspection technology in case of functional loss and unauthorized operation for equipment in (1) were studied.
In 2015, a functional requirement document for threat inspection technology prototyping was developed.
Study key aspects:
・Threat analysis of authenticity and integrity conformation functions based on business logics of individual actors.
・Functional requirements on threat inspection technology for the root of trust threats based on above mentioned threat analysis.
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る