Abstract
Trust has various instantiations: some rely on real-world relationships between entities, while others depend on robust hardware and software technologies to establish it post-deployment. In this paper, we focus on the latter, analyse their evolution in previous years, and their scope in the near future. The evolution of such technologies has involved diverse approaches; consequently, trust is understood and ascertained differently across heterogeneous systems and domains. We look at trusted hardware and software technologies from a security perspective – revisiting and analysing the Trusted Platform Module (TPM); Secure Elements (SE); hypervisors and virtualisation, including Java Card and Intel's Trusted eXecution Technology (TXT); Trusted Execution Environments (TEEs), such as GlobalPlatform TEE and Intel SGX; Host Card Emulation (HCE); and the Encrypted Execution Environment (E3). In our analysis, we focus on these technologies and their application to the emerging domains of the Internet of Things (IoT) and Cyber-Physical Systems (CPS).
Original language | English |
---|---|
Title of host publication | 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). |
Editors | Yang Xiang, Kui Ren, Dengguo Feng |
Publisher | IEEE Computer Society |
Pages | 168-177 |
Number of pages | 10 |
ISBN (Electronic) | 978-1-5090-3205-1 |
DOIs | |
Publication status | Published - 9 Feb 2017 |