1. Research and application of computer security instruction sets, using security instruction sets to complete software privilege management and memory protection;
2. Research and application of computer micro-architecture security architecture, research on micro-architecture anti-side channel attacks, micro-architecture isolation and access control technologies.
1. Familiar with computer architecture, have a good grasp of processor micro-architecture and instruction set, and common chip security technologies such as three defenses (anti-side channel attack, anti-fault injection, anti-physical attack, etc.) technology, chip attack and defense technology Have a certain understanding;
2. Have a good understanding of chip isolation technology and instruction set priority, and understand the technical principles of memory management and memory access control technology;
3. Familiar with security design technology combining software and hardware, and be able to use it flexibly Chip isolation and access control mechanism to help implement software security protection;
4. Familiar with compilation principles, and have a good understanding of common memory protection technologies such as ARM’s PXN/PAN, compilation option ASLR, and CFI technology.
Native Chinese Mandarin speaking as working language.