<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">trudyniisi</journal-id><journal-title-group><journal-title xml:lang="ru">Труды НИИСИ</journal-title><trans-title-group xml:lang="en"><trans-title>SRISA Proceedings</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2225-7349</issn><issn pub-type="epub">3033-6422</issn><publisher><publisher-name>НИЦ «КУРЧАТОВСКИЙ ИНСТИТУТ» - НИИСИ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.25682/NIISI.2025.3.0005</article-id><article-id custom-type="elpub" pub-id-type="custom">trudyniisi-114</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ВЫЧИСЛИТЕЛЬНЫЕ СИСТЕМЫ И ИХ ЭЛЕМЕНТЫ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>COMPUTING SYSTEMS AND THEIR COMPONENTS</subject></subj-group></article-categories><title-group><article-title>Аппаратные основы адаптивной безопасности: технологии изоляции и их интеграция в современные системы защиты</article-title><trans-title-group xml:lang="en"><trans-title>Hardware foundations of adaptive security: isolation technologies and their integration into modern protection systems</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Земков</surname><given-names>С. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Zemkov</surname><given-names>S. I.</given-names></name></name-alternatives><email xlink:type="simple">zemkov@cs.niisi.ras.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Гревцев</surname><given-names>Н. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Grevtsev</surname><given-names>N. A.</given-names></name></name-alternatives><email xlink:type="simple">ngrevcev@cs.niisi.ras.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Чибисов</surname><given-names>П. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Chibisov</surname><given-names>P. A.</given-names></name></name-alternatives><email xlink:type="simple">chibisov@cs.niisi.ras.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">НИЦ «Курчатовский институт» - НИИСИ<country>Россия</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>28</day><month>12</month><year>2025</year></pub-date><volume>15</volume><issue>3</issue><issue-title>ТРУДЫ НИИСИ. МАТЕМАТИЧЕСКОЕ И КОМПЬЮТЕРНОЕ МОДЕЛИРОВАНИЕ СЛОЖНЫХ СИСТЕМ: ТЕОРЕТИЧЕСКИЕ И ПРИКЛАДНЫЕ АСПЕКТЫ</issue-title><fpage>38</fpage><lpage>41</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Земков С.И., Гревцев Н.А., Чибисов П.А., 2025</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="ru">Земков С.И., Гревцев Н.А., Чибисов П.А.</copyright-holder><copyright-holder xml:lang="en">Zemkov S.I., Grevtsev N.A., Chibisov P.A.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.t-niisi.ru/jour/article/view/114">https://www.t-niisi.ru/jour/article/view/114</self-uri><abstract><p>Статья исследует аппаратные основы адаптивной безопасности — подхода к созданию систем, архитектурно устойчивых к атакам. Рассматриваются ключевые технологии изоляции (TEE, SEV, TPM) и их интеграция в адаптивные системы безопасности. Делается вывод о необходимости комплексного подхода, сочетающего аппаратные гарантии с динамическим программным анализом и оркестрацией.</p></abstract><trans-abstract xml:lang="en"><p>The article explores the hardware foundations of adaptive security—an approach to creating systems that are architecturally resilient to attacks. It examines key isolation technologies (TEE, SEV, TPM) and their integration into adaptive security systems. The conclusion emphasizes the necessity of a comprehensive approach that combines hardware guarantees with dynamic software analysis and orchestration.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>адаптивная безопасность</kwd><kwd>аппаратная изоляция</kwd><kwd>доверенные среды выполнения</kwd></kwd-group><kwd-group xml:lang="en"><kwd>adaptive security</kwd><kwd>hardware isolation</kwd><kwd>trusted execution environments</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Alves-Foss J. et al. The MILS architecture for high-assurance embedded systems // International journal of embedded systems. – 2006. – Vol. 2. – No. 3-4. – P. 239-247.</mixed-citation><mixed-citation xml:lang="en">Alves-Foss J. et al. The MILS architecture for high-assurance embedded systems // International journal of embedded systems. – 2006. – Vol. 2. – No. 3-4. – P. 239-247.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Hoekstra M., Lal R., Pappachan P., Phegade V., Del Cuvillo J. Using innovative instructions to create trustworthy software solutions // Proc. of the Network and Distributed System Security Symposium (NDSS 2013). 2013.</mixed-citation><mixed-citation xml:lang="en">Hoekstra M., Lal R., Pappachan P., Phegade V., Del Cuvillo J. Using innovative instructions to create trustworthy software solutions // Proc. of the Network and Distributed System Security Symposium (NDSS 2013). 2013.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Boubakri, M.; Zouari, B. A Survey of RISC-V Secure Enclaves and Trusted Execution Environments. Electronics 2025, 14, 4171.</mixed-citation><mixed-citation xml:lang="en">Boubakri, M.; Zouari, B. A Survey of RISC-V Secure Enclaves and Trusted Execution Environments. Electronics 2025, 14, 4171.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg,M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom, “Spectre attacks: Exploiting speculative execution,” Communications of the ACM, vol. 63, pp. 93–101, 2020.</mixed-citation><mixed-citation xml:lang="en">P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg,M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom, “Spectre attacks: Exploiting speculative execution,” Communications of the ACM, vol. 63, pp. 93–101, 2020.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Baumann A., Peinado M., Hunt G. Shielding applications from an untrusted cloud with Haven // ACM Transactions on Computer Systems (TOCS). 2015. Vol. 33. No. 3. Pp. 1–26.</mixed-citation><mixed-citation xml:lang="en">Baumann A., Peinado M., Hunt G. Shielding applications from an untrusted cloud with Haven // ACM Transactions on Computer Systems (TOCS). 2015. Vol. 33. No. 3. Pp. 1–26.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Kaplan D., Powell J., Woller T. AMD Memory Encryption. White paper, 2016.</mixed-citation><mixed-citation xml:lang="en">Kaplan D., Powell J., Woller T. AMD Memory Encryption. White paper, 2016.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Sailer R., Zhang X., Jaeger T., Van Doorn L. Design and implementation of a TCG-based integrity measurement architecture // Proc. of the 13th USENIX Security Symposium. 2004. Pp. 223–238.</mixed-citation><mixed-citation xml:lang="en">Sailer R., Zhang X., Jaeger T., Van Doorn L. Design and implementation of a TCG-based integrity measurement architecture // Proc. of the 13th USENIX Security Symposium. 2004. Pp. 223–238.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Schwarz M., Li S., Weiser S., Gruss D. Practical enclave malware with Intel SGx. arXiv preprint arXiv:2002.05649, 2020.</mixed-citation><mixed-citation xml:lang="en">Schwarz M., Li S., Weiser S., Gruss D. Practical enclave malware with Intel SGx. arXiv preprint arXiv:2002.05649, 2020.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Smith J., Johnson M. A survey of artificial immune system based intrusion detection // Journal of Network and Computer Applications. 2015. Vol. 52. Pp. 1–20.</mixed-citation><mixed-citation xml:lang="en">Smith J., Johnson M. A survey of artificial immune system based intrusion detection // Journal of Network and Computer Applications. 2015. Vol. 52. Pp. 1–20.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Wilson P., Taylor S. Artificial immune systems in local and network cybersecurity: An overview of intrusion detection strategies // Proc. of the International Conference on Cybersecurity. 2021. Pp. 45–62.</mixed-citation><mixed-citation xml:lang="en">Wilson P., Taylor S. Artificial immune systems in local and network cybersecurity: An overview of intrusion detection strategies // Proc. of the International Conference on Cybersecurity. 2021. Pp. 45–62.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Соболев С. П. Кибериммунный подход к разработке. Иллюстрация применения на базе микросервисной архитектуры // Вестник СПбГУ. Серия 10. Прикладная математика. Информатика. Процессы управления. 2024. № 1.</mixed-citation><mixed-citation xml:lang="en">Соболев С. П. Кибериммунный подход к разработке. Иллюстрация применения на базе микросервисной архитектуры // Вестник СПбГУ. Серия 10. Прикладная математика. Информатика. Процессы управления. 2024. № 1.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
