Abstract

The convergence of information technology systems, data networks, embedded systems and Internet-of-Things (IoT) within the cyber-physical system (CPS) paradigm has led to the emergence of new security threats associated with the system hardware. To control risks of potential hardware security vulnerabilities, secure processors were developed using crypto-processors, Trusted Execution Environment (TEE) and secure boot. Secure processors have a critical role in achieving high assurance of security systems. They provide a secure execution environment for guarding against unauthorised access to secret keys and decrypted information. Besides, such secure execution environment are critical to sensitive operations such as secure key generation, management and storage. Moreover, secure processors mitigate information leakage through main and side channels. In this article, we survey the state of the art literature on secure processors, by focusing our attention on protective measures for hardware, boot and the execution environment. We also present current trends and design challenges.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.