The Community for Technology Leaders
Green Image
Issue No. 03 - March (2018 vol. 67)
ISSN: 0018-9340
pp: 361-374
Pieter Maene , Department of Electrical Engineering (ESAT), COSIC, KU Leuven, Leuven, Belgium
Johannes Gotzfried , Department of Computer Science, FAU Erlangen-Nürnberg, Erlangen, Germany
Ruan de Clercq , Department of Electrical Engineering (ESAT), COSIC, KU Leuven, Leuven, Belgium
Tilo Muller , Department of Computer Science, FAU Erlangen-Nürnberg, Erlangen, Germany
Felix Freiling , Department of Computer Science, FAU Erlangen-Nürnberg, Erlangen, Germany
Ingrid Verbauwhede , Department of Electrical Engineering (ESAT), COSIC, KU Leuven, Leuven, Belgium
ABSTRACT
Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports of numerous attacks have been published, against the constrained embedded devices of the Internet of Things, mobile devices like smartphones and tablets, high-performance desktop and server environments, as well as complex industrial control systems. Trusted computing architectures give users and remote parties like software vendors guarantees about the behaviour of the software they run, protecting them against software-level attackers. This paper defines the security properties offered by them, and presents detailed descriptions of twelve hardware-based attestation and isolation architectures from academia and industry. We compare all twelve designs with respect to the security properties and architectural features they offer. The presented architectures have been designed for a wide range of devices, supporting different security properties.
INDEX TERMS
Computer architecture, Software, Hardware, Software measurement, Encryption, Computers
CITATION

P. Maene, J. Gotzfried, R. de Clercq, T. Muller, F. Freiling and I. Verbauwhede, "Hardware-Based Trusted Computing Architectures for Isolation and Attestation," in IEEE Transactions on Computers, vol. 67, no. 3, pp. 361-374, 2018.
doi:10.1109/TC.2017.2647955
676 ms
(Ver 3.3 (11022016))