Securing Embedded Systems Using Hardware-based Security Features (E20b)
Processors used in today’s embedded systems span the spectrum of available hardware-based security features that can be enabled to secure these systems. This session will examine use cases of three primary processor architectures (NXP PPC, Intel, and Xilinx ARM) and the available hardware-based security features, along with the restrictions an embedded environment and a real-time operating system, levies on the approach. An approach for each processor architecture will also be presented with the needed augmentation of software-based security features to achieve a secure system, as well as an overview of the impacts of FIPS 140-2 certification needs and quantum computing. Security features covered will include: secure boot, trusted boot, cryptographic processor algorithms, attestation, random number generation, secure key storage, physical tamper monitoring, and JTAG protection.