skip to main content
10.1145/2508859.2512509acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Enhanced embedded device security by combining hardware-based trust mechanisms

Published: 04 November 2013 Publication History

Abstract

Nowadays embedded systems in many application areas such as automotive, medical and industrial automation are designed with well-defined hardware and software components which are not meant to be exposed for user modifications. Adding or removing components to/from such systems is not permitted and sometimes not even possible since the systems often have to be up and running in a 24/7 manner. However due to the well-known nature of these types of embedded platform configuration the effort an attacker has to invest usually is reduced. The proposed publication presents a defense in depth strategy for application specific embedded devices by combining hardware-based security enhancements of modern processors with hardware security modules.

References

[1]
C. Deng, L. Yang, L. Ma, and Y. Cao. Architecture for secure scada system based on if-map scheme. In Computer Science and Convergence, pages 427--435. Springer, 2012.
[2]
Freescale Semiconductor. Hab code-signing tool - user's guide, November 2012.
[3]
Freescale Semiconductor. Secure boot on i.mx50, i.mx53, and i.mx 6 series using habv4, October 2012.
[4]
GlobalPlatform. Trusted execution environment (tee) guide. http://www.globalplatform.org/, July 2013.
[5]
N. Kuntze and C. Rudolph. On the automatic establishment of security relations for devices. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management. IFIP/IEEE, 2013.
[6]
N. Kuntze, C. Rudolph, I. Bente, J. Vieweg, and J. von Helden. Interoperable device identification in smart-grid environments. In Power and Energy Society General Meeting, 2011 IEEE, july 2011.
[7]
A. Oberle, A. Rein, N. Kuntze, R. Carsten, J. Paatero, L. Andrew, and P. Racz. Integrating Trust Establishment into Routing Protocols of Today's MANETs. In 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013), pages 1403--1408, Shanghai, China, April 2013.
[8]
Open Virtualization Project. Open virtualization for arm trustzone. http://www.openvirtualization.org/open-source-arm-trustzone.html, July 2013.
[9]
C. Rudolph, N. Kuntze, T. Kemmerich, and B. Endicott-Popovsky. Scenarios for reliable and secure digital evidence. In Ninth Annual IFIP WG 11.9 International Conference, 2013.
[10]
M. Schramm and A. Grzemba. The benefits of combining trusted computing with virtualization techniques. In Applied Electronics (AE), 2010 International Conference on, pages 1--4, 2010.
[11]
M. Schramm and A. Grzemba. Trustworthy building blocks for a more secure embedded computing environment. In Applied Electronics (AE), 2011 International Conference on, pages 1--4, 2011.
[12]
Sierraware. Sierraware Announces that the Open Source SierraTEE and SierraVisor SDKs Now Support Xilinx Zynq-7000 All Programmable SoCs . http://www.sierraware.com/news_xilinx_tee_arm_hypervisor.html, July 2013.
[13]
Trusted Computing Group. Tpm main specification part 1, 2, 3. http://www.trustedcomputinggroup.org/, March 2011.
[14]
J. von Helden, I. Bente, J. Vieweg, and B. Hellmann. Trusted network connect (tnc). European Trusted Infrastructure Summer School, page 54, 2009.

Cited By

View all
  • (2014)Resilient core networks for energy distribution2014 IEEE PES General Meeting | Conference & Exposition10.1109/PESGM.2014.6939164(1-5)Online publication date: Jul-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
November 2013
1530 pages
ISBN:9781450324779
DOI:10.1145/2508859
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2013

Check for updates

Author Tags

  1. arm trustzone
  2. chain of trust
  3. hab
  4. i.mx6
  5. tnc
  6. tpm

Qualifiers

  • Poster

Conference

CCS'13
Sponsor:

Acceptance Rates

CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Resilient core networks for energy distribution2014 IEEE PES General Meeting | Conference & Exposition10.1109/PESGM.2014.6939164(1-5)Online publication date: Jul-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media