Previous Page  43 / 84 Next Page
Information
Show Menu
Previous Page 43 / 84 Next Page
Page Background

Figure 3 Abaco 6U OpenVPX single-

board computer and a Rugged

System Enclosure

The Root of Trust

At the lowest level, a robust AT design

requires a root of trust, or a certified

CPU-based

hardware/firmware

element that provides the basis for

a secure boot process. The root of

trust validates the next stage, starting

a sequential process that builds

the trusted system as each stage

is validated. This protects against

executing untrusted code, detects

use of modified security values, and

prevents software attacks. Intel and

Freescale processors provide methods

to that end using cryptographic keys

and certified, un-modifiable BIOS

or bootROMs. These features are

discussed in the following sections.

Another critical component is the

FPGA-based security hub - a central

system monitor that detects and

provides customized responses to

tamper events. The security hub

works with the trusted processing

system and provides independent

control to manage AT policies. Finally,

encrypted storage is used to protect

data and application software. An

example architecture is shown in

Figure 4.

COTS Trusted Execution

Intel Trusted Execution Technology

Intel Trusted Execution Technology

(TXT) defines a safe, isolated software

execution space that cannot be

observed or modified by unauthorized

software. The execution space

has dedicated resources that are

managed by the processor, chipset,

and operating system kernel. The

Figure 4 The FPGA Security Hub in an Intel-based Architecture

New-Tech Magazine Europe l 43