2018
DOI: 10.1109/tc.2017.2647955
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Based Trusted Computing Architectures for Isolation and Attestation

Abstract: Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports of numerous attacks have been published, against the constrained embedded devices of the Internet of Things, mobile devices like smartphones and tablets, high-performance desktop and server environments, as well as complex industrial control systems. Trusted computing architectures give users and remote parties like software vendors guarantees … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 115 publications
(72 citation statements)
references
References 26 publications
0
72
0
Order By: Relevance
“…Trojans are likely introduced by untrustworthy third-party IP, adversarial designers, or through "hacking" of design tools [66], or, arguably even more likely, during distribution and deployment of ICs [67]. 2 Defense schemes can be classified into (i) Trojan detection during design and manufacturing time and (ii) Trojan mitigation at runtime. The former relies on testing, verification, et cetera [68][69][70][71][72][73][74][75], whereas the latter relies on dedicated security features for testability and self-authentication [76], monitoring and detection of malicious activities [77][78][79][80][81], etc.…”
Section: Trojanmentioning
confidence: 99%
“…Trojans are likely introduced by untrustworthy third-party IP, adversarial designers, or through "hacking" of design tools [66], or, arguably even more likely, during distribution and deployment of ICs [67]. 2 Defense schemes can be classified into (i) Trojan detection during design and manufacturing time and (ii) Trojan mitigation at runtime. The former relies on testing, verification, et cetera [68][69][70][71][72][73][74][75], whereas the latter relies on dedicated security features for testability and self-authentication [76], monitoring and detection of malicious activities [77][78][79][80][81], etc.…”
Section: Trojanmentioning
confidence: 99%
“…Maene et al [28] evaluated 14 hardware-based trusted computing architectures, including the above-mentioned four lightweight architectures with respect to different security properties. SIA provides five of the seven security properties considered by Maene et al [28], namely isolation, attestation, dynamic root of trust, code confidentiality, and protection against software side-channels targeting memory access patterns. Additionally, SIA provides support for secure intermittent computing of virtually any application and its security properties hold in the intermittent computing model.…”
Section: Related Workmentioning
confidence: 99%
“…The core idea of many security architectures is to enforce some form of software isolation. Depending on how software isolation is enforced, a trusted computing architecture can be based on hardware, software, or hardware/software codesign [28]. A security architecture may provide local or remote attestation.…”
Section: Introductionmentioning
confidence: 99%
“…In order to combat this tendency, the researchers make a preliminary probe into two types of defense methods: deviceoriented and network-oriented cases. In the device-oriented cases, trusted computing for industrial embedded devices [16] is a burgeoning security technology to provide system integrity check and data confidentiality protection. In the network-oriented cases, industrial firewall [11,17] and intrusion detection [15,18,19] are the typical applications in industrial control networks to improve the communication security.…”
Section: Security and Communication Networkmentioning
confidence: 99%