Abstract

A hardware system entrusted with security is referred to as the trusted platform module (TPM) which is available for various processor architectures. The two important processor architectures which account for most of general computing systems are based on ARM and x86 processors. The ARM processors have a TPM referred to as TrustZone architecture. The x86 systems' security directives are dictated by the Trusted Computing Group (TCG) which defines the TPM coprocessor features. In this paper, we compare these two approaches of TPM architectures. An effective TPM needs to be adaptive as threats evolve. Threats can arise from firmware bugs in the TPM or decay in the complexity of ciphering algorithms. Therefore, we propose adaptive TPM architecture to counter evolving threats using an FPGA block to alter and patch firmware and change ciphering systems. This along with the one to one association of an explicit security policy with threat is shown to be a powerful counter towards evolving threats.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call