Paper 2023/251
Hardware Root-of-Trust implementations in Trusted Execution Environments
Abstract
Hardware-based Root of Trust (HRT) is considered the gold standard for bootstrapping trust in secure computing. This paper analyzes HRT implementations across state-of-the-art TEEs and differentiates HRT implementation across two dimensions: 1) Security Properties & Threats and 2) Hardware Capabilities. Later, this work analyzes and compares 1) Intel SGX, 2) ARM TrustZone, 3) NXP Trust Architecture, 4) AMD SEV, 5) Microsoft Pluton, and 6) Apple T2 HRTs in terms of threats, security properties, and capabilities.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint.
- Keywords
- Hardware Root-of-TrustTrusted ComputingSecure Hardware
- Contact author(s)
-
usman ali @ uconn edu
hamza omar @ uconn edu
Chujiao_Ma @ comcast com
Vaibhav_Garg @ comcast com
khan @ uconn edu - History
- 2023-02-22: revised
- 2023-02-22: received
- See all versions
- Short URL
- https://ia.cr/2023/251
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/251, author = {Usman Ali and Hamza Omar and Chujiao Ma and Vaibhav Garg and Omer Khan}, title = {Hardware Root-of-Trust implementations in Trusted Execution Environments}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/251}, year = {2023}, url = {https://eprint.iacr.org/2023/251} }