Hardware foundations of adaptive security: isolation technologies and their integration into modern protection systems
https://doi.org/10.25682/NIISI.2025.3.0005
Abstract
The article explores the hardware foundations of adaptive security—an approach to creating systems that are architecturally resilient to attacks. It examines key isolation technologies (TEE, SEV, TPM) and their integration into adaptive security systems. The conclusion emphasizes the necessity of a comprehensive approach that combines hardware guarantees with dynamic software analysis and orchestration.
About the Authors
S. I. ZemkovRussian Federation
N. A. Grevtsev
Russian Federation
P. A. Chibisov
Russian Federation
References
1. Alves-Foss J. et al. The MILS architecture for high-assurance embedded systems // International journal of embedded systems. – 2006. – Vol. 2. – No. 3-4. – P. 239-247.
2. Hoekstra M., Lal R., Pappachan P., Phegade V., Del Cuvillo J. Using innovative instructions to create trustworthy software solutions // Proc. of the Network and Distributed System Security Symposium (NDSS 2013). 2013.
3. Boubakri, M.; Zouari, B. A Survey of RISC-V Secure Enclaves and Trusted Execution Environments. Electronics 2025, 14, 4171.
4. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg,M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom, “Spectre attacks: Exploiting speculative execution,” Communications of the ACM, vol. 63, pp. 93–101, 2020.
5. Baumann A., Peinado M., Hunt G. Shielding applications from an untrusted cloud with Haven // ACM Transactions on Computer Systems (TOCS). 2015. Vol. 33. No. 3. Pp. 1–26.
6. Kaplan D., Powell J., Woller T. AMD Memory Encryption. White paper, 2016.
7. Sailer R., Zhang X., Jaeger T., Van Doorn L. Design and implementation of a TCG-based integrity measurement architecture // Proc. of the 13th USENIX Security Symposium. 2004. Pp. 223–238.
8. Schwarz M., Li S., Weiser S., Gruss D. Practical enclave malware with Intel SGx. arXiv preprint arXiv:2002.05649, 2020.
9. Smith J., Johnson M. A survey of artificial immune system based intrusion detection // Journal of Network and Computer Applications. 2015. Vol. 52. Pp. 1–20.
10. Wilson P., Taylor S. Artificial immune systems in local and network cybersecurity: An overview of intrusion detection strategies // Proc. of the International Conference on Cybersecurity. 2021. Pp. 45–62.
11. Соболев С. П. Кибериммунный подход к разработке. Иллюстрация применения на базе микросервисной архитектуры // Вестник СПбГУ. Серия 10. Прикладная математика. Информатика. Процессы управления. 2024. № 1.
Review
For citations:
Zemkov S.I., Grevtsev N.A., Chibisov P.A. Hardware foundations of adaptive security: isolation technologies and their integration into modern protection systems. SRISA Proceedings. 2025;15(3):38-41. (In Russ.) https://doi.org/10.25682/NIISI.2025.3.0005