ID 原文 译文
56708 随着科技快速进步,新兴应用不断涌现. With the rapid development of technology, software is rapidly evolving with emerging applications.
56709 无法响应软件变化的芯片,如专用集成电路(application-specific integrated circuit, ASIC),将因为生命周期过短,面临一次性工程成本(non-recurring engineering,NRE)过高的难题. Chips that fail to adapt to software (e. g. , application-specific integrated circuits, ASICs) suffer from a shortlifecycle and high nonrecurring engineering (NRE) costs.
56710 与此同时,随着摩尔定律(Moore’s law)和迪纳徳定律(Dennard scaling)走向终结,未来集成电路工艺更新带来的能效收益越来越小,通用处理器可实现的计算能力被芯片功耗约束. Meanwhile, as the projection of Moore’s law and Dennardscaling are decreasing, energy efficiency has shown a diminishing return with new technologies.
56711 近几年兴起的领域定制加速器(domain-specific accelerator, DSA)通过针对特定应用领域的计算模式,定制芯片架构,以期兼顾能量效率和特定领域内的灵活性.但目前DSA面向硬件定制软件,这导致软件生态碎片化,程序员学习成本增大.未来芯片设计需要兼顾灵活性、能量效率和可编程性. The computingcapacity of general-purpose processors is limited due to power budgets. Consequently, future chips must jointlyoptimize flexibility, power efficiency, and ease of programmability.
56712 可重构芯片通过融合处理器的高灵活性、ASIC的高能效,并通过重构提供了在运行时根据软件定制芯片架构的能力,是当前SDC的研究热点. Reconfigurable chips combine the high flexibilityof a general-purpose processor and high energy efficiency of ASIC by providing on-demand customization of theirarchitectures.
56713 本文首先回顾SDC的研究动机,然后分析可重构芯片如何满足SDC的需求,之后探讨当前可重构芯片面临的挑战,最后阐述为了实现SDC,可重构芯片未来的发展方向. This article thoroughly reviews the development and architecture of reconfigurable chips. Moreover,the future challenges of reconfigurable chips are analyzed. Based on these challenges, future directions are alsodiscussed.
56714 可信计算以硬件安全机制为基础,建立可信赖计算环境,从体系结构上全面增强系统和网络信任,是当前学术界和产业界的关注热点. Trusted computing is based on a hardware security mechanism establishing a trusted computingenvironment and comprehensively enhances the system and network trust from the architectural perspective.
56715 随着信息技术的深入发展,新应用场景的不断涌现,网络空间的安全威胁日益严峻,因此可信计算在重要信息系统的安全防护领域将发挥越来越重要的作用. With the development of information technology and continuous emergence of new application scenarios, securitythreats in the cyberspace are becoming increasingly serious; hence, trusted computing is actively researched inboth academia and industry to find solutions against such treats.
56716 本文从创新发展角度,围绕作者20年来在可信计算领域的研究成果,综述了可信计算理论的发展历程,提炼总结出涵盖两大方法基础、三大信任核心和四大关键技术的可信计算技术体系,阐述了移动可信计算、抗量子可信计算、可信物联网、可信云、可信区块链等方面的重要研究问题以及可信计算在这些领域的融合创新成果. This paper summarizes the development processof trusted computing theory from the perspective of innovation and development. The study centers around oneof the author’s research results in trusted computing over the past 20 years. It proposes a trusted computingtechnology architecture that covers two method foundations, three trust cores, and four key technologies. Fur?thermore, the paper summarizes important research problems in mobile trusted computing, quantum-resistanttrusted computing, trusted Internet of Things (IoT), trusted cloud, and trusted blockchain, elaborating on theintegration and development of trusted computing in these fields.
56717 在移动可信计算方面,软硬件结合的可信执行环境体系架构设计和实现是研究重点,其次,移动操作系统内核运行时安全隔离防护,以及基于可信执行环境(trusted execution environment, TEE)的移动应用安全防护也是两个重要研究问题. In mobile trusted computing, the design andimplementation of a trusted execution environment architecture with software/hardware co-design is the focus ofresearch. Another two important research issues in mobile trusted computing are the runtime security isolationand protection of the mobile operating system’s kernel and trusted execution environment-based mobile applica?tion security protection.