From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Trusted execution environment
From the course: IoT Product Security
Trusted execution environment
Hi, I'm Matthew Clark. And this is Lesson 4.6: Trusted Execution Environment. In this lesson, we're going to introduce the trusted execution environment or TEE, we're going to take a look at its characteristics. Discuss the concept of security domains and take a look at secure boot. Finally, we will conclude with a review of the IoTSF secure boot recommendations. A well-designed TEE will consist of the following security principles: Secure boot, operating system isolation, application isolation, controlled access to hardware, and a tamper resistant hardware root of trust that's capable of protecting cryptographic secrets and executing code securely. In our previous lesson, we identified ways to make an integrated system on a chip secure by adding various hardware roots of trust and technologies to it. Software running on a non-secure processor allows other applications or individuals with root access to investigate and manipulate the code and data running on the device. A trusted…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-