2011 IEEE International Symposium on Hardware-Oriented Security and Trust 2011
DOI: 10.1109/hst.2011.5955006
|View full text |Cite
|
Sign up to set email alerts
|

Placement of trust anchors in embedded computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Once the TFIDS models are defined a subset of signals for the identified models can be analyzed to minimize the number of trust anchors required to support the TFIDS. If trust anchors are located throughout the system then the integrity of the signals can be verifiable at all points and the attacker will need to break the trust anchors to modify system operation [16], and in this case there is no need for a TFIDS. For cases where it is not possible (technically difficult or cost prohibitive) to create a fully trusted system, then a small number of trusted signals with the TFIDS allows for the detection of attacks.…”
Section: B Trust Support For Tfidsmentioning
confidence: 99%
“…Once the TFIDS models are defined a subset of signals for the identified models can be analyzed to minimize the number of trust anchors required to support the TFIDS. If trust anchors are located throughout the system then the integrity of the signals can be verifiable at all points and the attacker will need to break the trust anchors to modify system operation [16], and in this case there is no need for a TFIDS. For cases where it is not possible (technically difficult or cost prohibitive) to create a fully trusted system, then a small number of trusted signals with the TFIDS allows for the detection of attacks.…”
Section: B Trust Support For Tfidsmentioning
confidence: 99%
“…Trust anchors in the SCADA security solution perform different roles depending on placement in the architecture [9]. Trust anchors perform interface monitoring functions and provide network protection with the support of encryption, secure communication, and protection of critical input/output (I/O) interfaces.…”
Section: Trust Anchor Functionalitymentioning
confidence: 99%