Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Research Article

Efficient Isolation of Trusted Subsystems in Embedded Systems

Download
439 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-16161-2_20,
        author={Raoul Strackx and Frank Piessens and Bart Preneel},
        title={Efficient Isolation of Trusted Subsystems in Embedded Systems},
        proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={software security memory protection isolation},
        doi={10.1007/978-3-642-16161-2_20}
    }
    
  • Raoul Strackx
    Frank Piessens
    Bart Preneel
    Year: 2012
    Efficient Isolation of Trusted Subsystems in Embedded Systems
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-16161-2_20
Raoul Strackx1,*, Frank Piessens1,*, Bart Preneel1,*
  • 1: Katholieke Universiteit Leuven
*Contact email: raoul.strackx@cs.kuleuven.be, frank.piessens@cs.kuleuven.be, bart.preneel@esat.kuleuven.be

Abstract

Many embedded systems have relatively strong security requirements because they handle confidential data or support secure electronic transactions. A prototypical example are payment terminals. To ensure that sensitive data such as cryptographic keys cannot leak, security-critical parts of these systems are implemented as separate chips, and hence physically isolated from other parts of the system.