[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2023/251

Hardware Root-of-Trust implementations in Trusted Execution Environments

Usman Ali, University of Connecticut
Hamza Omar, University of Connecticut
Chujiao Ma, Comcast
Vaibhav Garg, Comcast
Omer Khan, University of Connecticut
Abstract

Hardware-based Root of Trust (HRT) is considered the gold standard for bootstrapping trust in secure computing. This paper analyzes HRT implementations across state-of-the-art TEEs and differentiates HRT implementation across two dimensions: 1) Security Properties & Threats and 2) Hardware Capabilities. Later, this work analyzes and compares 1) Intel SGX, 2) ARM TrustZone, 3) NXP Trust Architecture, 4) AMD SEV, 5) Microsoft Pluton, and 6) Apple T2 HRTs in terms of threats, security properties, and capabilities.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Hardware Root-of-TrustTrusted ComputingSecure Hardware
Contact author(s)
usman ali @ uconn edu
hamza omar @ uconn edu
Chujiao_Ma @ comcast com
Vaibhav_Garg @ comcast com
khan @ uconn edu
History
2023-02-22: revised
2023-02-22: received
See all versions
Short URL
https://ia.cr/2023/251
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/251,
      author = {Usman Ali and Hamza Omar and Chujiao Ma and Vaibhav Garg and Omer Khan},
      title = {Hardware Root-of-Trust implementations in Trusted Execution Environments},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/251},
      year = {2023},
      url = {https://eprint.iacr.org/2023/251}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.