本文へジャンプ

成果報告書詳細
管理番号20190000000220
タイトル*平成30年度中間年報 「戦略的イノベーション創造プログラ ム( SIP )/重要インフラ等におけるサイバーセキュリティの確保/(a1)制御・通信機器のセキュリティ確認技術の研究開発概要事業」
公開日2019/5/31
報告書年度2018 - 2018
委託先名日本電信電話株式会社
プロジェクト番号P15011
部署名IoT推進部
和文要約
英文要約Title: R&D project on security confirmation technologies for control and communication devices(FY2015-FY2019)FY2018 Annual Report

1.R&D on a platform for authenticity and integrity confirmation based on the tamper resistant module
An integrity confirmation system which possesses its lifecycle and system scalability is studied using the trust chain among control and communication devices based on the reliable elements (the root of trust:RoT) which authenticity is confirmed.
In 2018, the introduction candidate system developed to introduce the technology to the infrastructure operators. In addition, the automatic configuration technology enabling application to various control and communication equipment was investigated.
At the same time, the functional requirement documents for the full scale version system was completed, based on the evaluation result of the introduction candidate system.

2.R&D for the configuration method of the tamper resistant module technology to realize authenticity and integrity confirmation
The configuration method of the technology of the root of trust in the control and communication devices was studied. The method is used to confirm authenticity and integrity throughout the whole system and its lifecycle.
In 2018, the technical evaluation was completed based on the requirements about the RoT defined in 2017 and the introduction candidate system was implemented. In technical verification, the applicability for social implementation was evaluated. At the same time, the functional requirement documents for the full scale version system was completed, incorporated in above 1.

3.Inspection technology for threats against the authenticity and integrity confirmation function using tamper resistant module and virtual tamper resistant module
An integrity confirmation function is valid for objects on a hard disc but not for objects on memory. Therefore, vulnerability attack to programs on memory may cause threats which include functional loss of the root of trust and unauthorized operation of equipment.
The inspection technologies, which include (1)Confirmation technology for retaining authenticity and integrity confirmation functions in control and communication devices, and (2)Vulnerability inspection technology in case of functional loss of authenticity and integrity confirmation functions in control and communication devices and unauthorized operation for the devices, are studied for the control and communication devices with authenticity and integrity confirmation functions based the technology of above 1 and 2.
In 2018, the inspection technologies for introduction candidate system was completed. By this technology, the integrators, user companies or third parties respectively can inspect control and communication devices and the applicability in the supply chain can be improved.
At the same time, the functional requirement documents for the full scale version system to be implemented in 2019, which main research theme is vulnerability examination assuming the occurrence of more advanced attacks , was completed.
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る