Title :
Trustworthy building blocks for a more secure embedded computing environment
Author :
Schramm, Martin ; Grzemba, Andreas
Author_Institution :
Univ. of Appl. Sci., Deggendorf, Germany
Abstract :
It is amazing how accustomed we have grown to the ubiquitous threats in our every day computing lives. By now the design flaws in hardware components, as well as software applications and operating systems, are well known and can easily be exploited if an injection vector is found. Furthermore, there is a movement in the embedded sector to shift away from proprietary software and hardware components to the well-established ×86 architecture and to employ commonly used operating systems such as Windows or Linux. In addition attacks against IT systems are becoming more sophisticated and pure software-based solutions cannot guarantee lifetime integrity anymore. To improve on this situation, it is necessary to anchor additional hardware-based security modules as an integral part of a platform. Today´s systems have a requirement for a high level of dependability, offering both safety and security features. In this paper we propose an efficient hardware-based security architecture utilizing Trusted Computing (TC) techniques based on trustworthy building blocks. A key focus of the work is the development of a hypervisor-based security architecture which utilizes a state-of-the-art hardware trust anchor to increase the security and trustworthiness of commonly used operating systems in the embedded ×86 sector.
Keywords :
embedded systems; operating systems (computers); security of data; software architecture; ubiquitous computing; IT systems; dependability; design flaw; embedded x86 architecture; hardware components; hardware-based security architecture; hardware-based security module; hypervisor-based security architecture; injection vector; lifetime integrity; operating system; proprietary software; safety features; secure embedded computing environment; software application; software-based solution; trustworthy building blocks; ubiquitous threats; Architecture; Computer architecture; Cryptography; Hardware; Operating systems;
Conference_Titel :
Applied Electronics (AE), 2011 International Conference on
Conference_Location :
Pilsen
Print_ISBN :
978-1-4577-0315-7
Electronic_ISBN :
1803-7232