TY - GEN
T1 - Secure and Trusted Execution
T2 - Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
AU - Shepherd, Carlton
AU - Arfaoui, Ghada
AU - Gurulian, Iakovos
AU - Lee, Robert P
AU - Markantonakis, Konstantinos
AU - Akram, Raja
AU - Sauveron, Damien
AU - Conchon, Emmanuel
N1 - ACKNOWLEDGEMENTS
Carlton Shepherd and Robert P. Lee are supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/K035584/1).
Emmanuel Conchon and Damien Sauveron are supported by the IoTSec (IoT Security) project funded by Region Limousin.
The authors would like to thank anonymous reviewers for their valuable comments that help us improve the paper.
PY - 2017/2/9
Y1 - 2017/2/9
N2 - Trust has various instantiations: some rely on real-world relationships between entities, while others depend on robust hardware and software technologies to establish it post-deployment. In this paper, we focus on the latter, analyse their evolution in previous years, and their scope in the near future. The evolution of such technologies has involved diverse approaches; consequently, trust is understood and ascertained differently across heterogeneous systems and domains. We look at trusted hardware and software technologies from a security perspective – revisiting and analysing the Trusted Platform Module (TPM); Secure Elements (SE); hypervisors and virtualisation, including Java Card and Intel's Trusted eXecution Technology (TXT); Trusted Execution Environments (TEEs), such as GlobalPlatform TEE and Intel SGX; Host Card Emulation (HCE); and the Encrypted Execution Environment (E3). In our analysis, we focus on these technologies and their application to the emerging domains of the Internet of Things (IoT) and Cyber-Physical Systems (CPS).
AB - Trust has various instantiations: some rely on real-world relationships between entities, while others depend on robust hardware and software technologies to establish it post-deployment. In this paper, we focus on the latter, analyse their evolution in previous years, and their scope in the near future. The evolution of such technologies has involved diverse approaches; consequently, trust is understood and ascertained differently across heterogeneous systems and domains. We look at trusted hardware and software technologies from a security perspective – revisiting and analysing the Trusted Platform Module (TPM); Secure Elements (SE); hypervisors and virtualisation, including Java Card and Intel's Trusted eXecution Technology (TXT); Trusted Execution Environments (TEEs), such as GlobalPlatform TEE and Intel SGX; Host Card Emulation (HCE); and the Encrypted Execution Environment (E3). In our analysis, we focus on these technologies and their application to the emerging domains of the Internet of Things (IoT) and Cyber-Physical Systems (CPS).
U2 - 10.1109/TrustCom.2016.0060
DO - 10.1109/TrustCom.2016.0060
M3 - Published conference contribution
BT - IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PB - IEEE Computer Society
ER -