Abstract
This chapter introduces the root of trust. It then discusses ideas of measurement and chain of trust. These ideas are used to demonstrate trusted and authenticated boot, remote attestation, and data sealing. The chapter also presents ideas regarding runtime attestation and continuous attestation. It next presents ideas for use of PUFs as root of trust. It also introduces ideas, and shortcomings, of using authentication for limiting what code can execute in the TCB or TEE. The chapter closes with a list of assumptions about the root of trust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Szefer, J. (2019). Hardware Root of Trust. In: Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture. Springer, Cham. https://doi.org/10.1007/978-3-031-01760-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-01760-5_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-00632-6
Online ISBN: 978-3-031-01760-5
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 8