From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Trusted execution environment

Trusted execution environment

From the course: IoT Product Security

Trusted execution environment

Hi, I'm Matthew Clark. And this is Lesson 4.6: Trusted Execution Environment. In this lesson, we're going to introduce the trusted execution environment or TEE, we're going to take a look at its characteristics. Discuss the concept of security domains and take a look at secure boot. Finally, we will conclude with a review of the IoTSF secure boot recommendations. A well-designed TEE will consist of the following security principles: Secure boot, operating system isolation, application isolation, controlled access to hardware, and a tamper resistant hardware root of trust that's capable of protecting cryptographic secrets and executing code securely. In our previous lesson, we identified ways to make an integrated system on a chip secure by adding various hardware roots of trust and technologies to it. Software running on a non-secure processor allows other applications or individuals with root access to investigate and manipulate the code and data running on the device. A trusted…

Contents