Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/23/4843 |
_version_ | 1797400256787251200 |
---|---|
author | Luca Crocetti Pietro Nannipieri Stefano Di Matteo Sergio Saponara |
author_facet | Luca Crocetti Pietro Nannipieri Stefano Di Matteo Sergio Saponara |
author_sort | Luca Crocetti |
collection | DOAJ |
description | Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in the last years adopted the integration of dedicated resources to provide Trusted Execution Environments (TEEs) or secure zones. TEEs are built layer by layer on top of an implicitly trusted component, the Root-of-Trust (RoT). Since each security chain is only as strong as its weakest link, each element involved in the construction of a TEE starting from the RoT must be bulletproof as much as possible. In this work, we revise and propose a design methodology to implement in both hardware (HW) and software (SW) highly featured and robust security blocks by highlighting the key points that designers should take care of, and the key metrics that should be used to evaluate the security level of the developed modules. We also include an analysis of the state of the art concerning RoT-based TEEs, and we illustrate a case study that documents the implementation of a cryptographic coprocessor for the secure subsystem of the Rhea GPP from the European Processor Initiative (EPI) project, according to the presented methodology. This work can be used by HW/SW security module designers as a cutting-edge guideline. |
first_indexed | 2024-03-09T01:52:55Z |
format | Article |
id | doaj.art-6d1c1a5d02ae49f89c0a67441b33f283 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-09T01:52:55Z |
publishDate | 2023-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-6d1c1a5d02ae49f89c0a67441b33f2832023-12-08T15:14:13ZengMDPI AGElectronics2079-92922023-11-011223484310.3390/electronics12234843Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted EnvironmentsLuca Crocetti0Pietro Nannipieri1Stefano Di Matteo2Sergio Saponara3Department of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyDepartment of Information Engineering, University of Pisa, Via G. Caruso, 16, 56122 Pisa, ItalyCyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in the last years adopted the integration of dedicated resources to provide Trusted Execution Environments (TEEs) or secure zones. TEEs are built layer by layer on top of an implicitly trusted component, the Root-of-Trust (RoT). Since each security chain is only as strong as its weakest link, each element involved in the construction of a TEE starting from the RoT must be bulletproof as much as possible. In this work, we revise and propose a design methodology to implement in both hardware (HW) and software (SW) highly featured and robust security blocks by highlighting the key points that designers should take care of, and the key metrics that should be used to evaluate the security level of the developed modules. We also include an analysis of the state of the art concerning RoT-based TEEs, and we illustrate a case study that documents the implementation of a cryptographic coprocessor for the secure subsystem of the Rhea GPP from the European Processor Initiative (EPI) project, according to the presented methodology. This work can be used by HW/SW security module designers as a cutting-edge guideline.https://www.mdpi.com/2079-9292/12/23/4843computer securityTrusted Execution EnvironmentRoot-of-Trustsecure bootSide-Channel AttackCrypto-Tile |
spellingShingle | Luca Crocetti Pietro Nannipieri Stefano Di Matteo Sergio Saponara Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments Electronics computer security Trusted Execution Environment Root-of-Trust secure boot Side-Channel Attack Crypto-Tile |
title | Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments |
title_full | Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments |
title_fullStr | Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments |
title_full_unstemmed | Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments |
title_short | Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments |
title_sort | design methodology and metrics for robust and highly qualified security modules in trusted environments |
topic | computer security Trusted Execution Environment Root-of-Trust secure boot Side-Channel Attack Crypto-Tile |
url | https://www.mdpi.com/2079-9292/12/23/4843 |
work_keys_str_mv | AT lucacrocetti designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments AT pietronannipieri designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments AT stefanodimatteo designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments AT sergiosaponara designmethodologyandmetricsforrobustandhighlyqualifiedsecuritymodulesintrustedenvironments |