85 - Hardware in Security
If the hardware is compromised all software mechanisms become useless
Based on different root of trust components and well-defined interactions among them
Current: TPM2.0
Component that must ALWAYS behave as expected, as its misbehaviour cannot be detected
Basic building block of a chain of trust
Secure area of an SoC that guarantees code and data protection. Minimal security, mostly required by low-end closed embedded systems such as IoT or OS-less "bare-metal" solutions.
More and more commonly adopted.
MPU access or integrity violations cause immediate task abortion
Custom special components for performing security-specific operations,
Platforms designed for security, packed with features like accelerators for cryptography, anti-tampering and secure boot processes
Present in most modern processors and microcontrollers, introduced for safety
Hardware that can be trusted to perform as it should, with high resilience to tampering and other forms of attack with hardware as an attack vector