{"title":"Placement of trust anchors in embedded computer systems","authors":"S. Papa, W. Casper, S. Nair","doi":"10.1109/HST.2011.5955006","DOIUrl":null,"url":null,"abstract":"The use of Trust Anchors in a well designed embedded system can help create more secure designs. Trust Anchors can be used to establish, extend, and maintain trust during power-up and run-time operation of a system. A system may contain one or more trust anchors working isolated or in a coordinated manner within the system. Embedded computer systems may be subject to network and physical attacks and so the use of trust anchors may help protect the system from these attacks. By evaluating potential attacks the placement and functionality of trusted hardware and software in the system may be defined to help mitigate the attacks. This paper uses several different attacks on an embedded computer as examples to describe the placement of trust anchors, hardware and software protection mechanisms, and other functionality needed to protect the system against these attacks.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2011.5955006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The use of Trust Anchors in a well designed embedded system can help create more secure designs. Trust Anchors can be used to establish, extend, and maintain trust during power-up and run-time operation of a system. A system may contain one or more trust anchors working isolated or in a coordinated manner within the system. Embedded computer systems may be subject to network and physical attacks and so the use of trust anchors may help protect the system from these attacks. By evaluating potential attacks the placement and functionality of trusted hardware and software in the system may be defined to help mitigate the attacks. This paper uses several different attacks on an embedded computer as examples to describe the placement of trust anchors, hardware and software protection mechanisms, and other functionality needed to protect the system against these attacks.