New-Tech Europe Magazine | June 2016

The Root of Trust At the lowest level, a robust AT design requires a root of trust, or a certified CPU-based hardware/firmware element that provides the basis for a secure boot process. The root of trust validates the next stage, starting a sequential process that builds the trusted system as each stage is validated. This protects against executing untrusted code, detects use of modified security values, and prevents software attacks. Intel and Freescale processors provide methods to that end using cryptographic keys and certified, un-modifiable BIOS or bootROMs. These features are discussed in the following sections. Another critical component is the FPGA-based security hub - a central

system monitor that detects and provides customized responses to tamper events. The security hub works with the trusted processing system and provides independent control to manage AT policies. Finally, encrypted storage is used to protect data and application software. An example architecture is shown in Figure 4. COTS Trusted Execution Intel Trusted Execution Technology Intel Trusted Execution Technology (TXT) defines a safe, isolated software execution space that cannot be observed or modified by unauthorized software. The execution space has dedicated resources that are managed by the processor, chipset, and operating system kernel. The

Figure 3 Abaco 6U OpenVPX single- board computer and a Rugged System Enclosure

Figure 4 The FPGA Security Hub in an Intel-based Architecture

New-Tech Magazine Europe l 43

Made with