“…The evolution of embedded security platform architecture has been guided by technological advancements and a cause and effect of developing application requirements and design challenges [3], [12], [13], [15]. This includes the realisation of mix-critical applications, broader network connectivity, a need for code/data protection, isolation and segregation of resources leading to wider availability of embedded multiprocessing [6], [7], [9]. Where these computing platform advancements brought benefits, they have exposed platforms to wide-range security challenges due to increased system attack surface and micro-architecture vulnerabilities [12], [16], [17], [18], [19], [20], [21], [22].…”