Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments

Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and...

Full description

Bibliographic Details
Main Authors: Luca Crocetti, Pietro Nannipieri, Stefano Di Matteo, Sergio Saponara
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/23/4843
_version_ 1797400256787251200
author Luca Crocetti
Pietro Nannipieri
Stefano Di Matteo
Sergio Saponara
author_facet Luca Crocetti
Pietro Nannipieri
Stefano Di Matteo
Sergio Saponara
author_sort Luca Crocetti
collection DOAJ
description Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in the last years adopted the integration of dedicated resources to provide Trusted Execution Environments (TEEs) or secure zones. TEEs are built layer by layer on top of an implicitly trusted component, the Root-of-Trust (RoT). Since each security chain is only as strong as its weakest link, each element involved in the construction of a TEE starting from the RoT must be bulletproof as much as possible. In this work, we revise and propose a design methodology to implement in both hardware (HW) and software (SW) highly featured and robust security blocks by highlighting the key points that designers should take care of, and the key metrics that should be used to evaluate the security level of the developed modules. We also include an analysis of the state of the art concerning RoT-based TEEs, and we illustrate a case study that documents the implementation of a cryptographic coprocessor for the secure subsystem of the Rhea GPP from the European Processor Initiative (EPI) project, according to the presented methodology. This work can be used by HW/SW security module designers as a cutting-edge guideline.
first_indexed 2024-03-09T01:52:55Z
format Article
id doaj.art-6d1c1a5d02ae49f89c0a67441b33f283
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T01:52:55Z
publishDate 2023-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-6d1c1a5d02ae49f89c0a67441b33f2832023-12-08T15:14:13ZengMDPI AGElectronics2079-92922023-11-011223484310.3390/electronics12234843Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted EnvironmentsLuca Crocetti0Pietro Nannipieri1Stefano Di Matteo2Sergio Saponara3Department of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyCyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in the last years adopted the integration of dedicated resources to provide Trusted Execution Environments (TEEs) or secure zones. TEEs are built layer by layer on top of an implicitly trusted component, the Root-of-Trust (RoT). Since each security chain is only as strong as its weakest link, each element involved in the construction of a TEE starting from the RoT must be bulletproof as much as possible. In this work, we revise and propose a design methodology to implement in both hardware (HW) and software (SW) highly featured and robust security blocks by highlighting the key points that designers should take care of, and the key metrics that should be used to evaluate the security level of the developed modules. We also include an analysis of the state of the art concerning RoT-based TEEs, and we illustrate a case study that documents the implementation of a cryptographic coprocessor for the secure subsystem of the Rhea GPP from the European Processor Initiative (EPI) project, according to the presented methodology. This work can be used by HW/SW security module designers as a cutting-edge guideline.https://www.mdpi.com/2079-9292/12/23/4843computer securityTrusted Execution EnvironmentRoot-of-Trustsecure bootSide-Channel AttackCrypto-Tile
spellingShingle Luca Crocetti
Pietro Nannipieri
Stefano Di Matteo
Sergio Saponara
Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
Electronics
computer security
Trusted Execution Environment
Root-of-Trust
secure boot
Side-Channel Attack
Crypto-Tile
title Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
title_full Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
title_fullStr Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
title_full_unstemmed Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
title_short Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
title_sort design methodology and metrics for robust and highly qualified security modules in trusted environments
topic computer security
Trusted Execution Environment
Root-of-Trust
secure boot
Side-Channel Attack
Crypto-Tile
url https://www.mdpi.com/2079-9292/12/23/4843
work_keys_str_mv AT lucacrocetti designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments
AT pietronannipieri designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments
AT stefanodimatteo designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments
AT sergiosaponara designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments