POSTER: Enhanced embedded device security by combining hardware-based trust mechanisms

Nowadays embedded systems in many application areas such as automotive, medical and industrial automation are designed with well-defined hardware and software components which are not meant to be exposed for user modifications. Adding or removing components to/from such systems is not permitted and sometimes not even possible since the systems often have to be up and running in a 24/7 manner. However due to the well-known nature of these types of embedded platform configuration the effort an attacker has to invest usually is reduced. The proposed publication presents a defense in depth strategy for application specific embedded devices by combining hardware-based security enhancements of modern processors with hardware security modules.

[1]  Martin Schramm,et al.  Trustworthy building blocks for a more secure embedded computing environment , 2011, 2011 International Conference on Applied Electronics.

[2]  Martin Schramm,et al.  The benefits of combining trusted computing with virtualization techniques , 2010, 2010 International Conference on Applied Electronics.

[3]  Lin Yang,et al.  Architecture for Secure SCADA System Based on IF-MAP Scheme , 2012 .

[4]  Carsten Rudolph,et al.  On the automatic establishment of security relations for devices , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[5]  Carsten Rudolph,et al.  Integrating trust establishment into routing protocols of today's MANETs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[6]  宗藤 誠治,et al.  Trusted Network Connect - TPMの利用管理技術の動向 , 2007 .

[7]  Carsten Rudolph,et al.  Chapter 1 SCENARIOS FOR RELIABLE AND SECURE DIGITAL EVIDENCE , 2012 .

[8]  Carsten Rudolph,et al.  Interoperable device identification in Smart-Grid environments , 2011, 2011 IEEE Power and Energy Society General Meeting.