Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Title | Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Hoeller, A., Toegl, R. |
Conference Name | 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW) |
Date Published | apr |
Keywords | Availability, composability, cyber physical systems, cyber-attacks, Cyber-physical systems, dependability features, Embedded systems, Hardware, Industry 4.0, pubcrawl, Redundancy, reliability, Resiliency, Safety, secure elements, security, security mechanisms, security of data, Software, system manipulation, TPM, TPMs, Trusted Computing, Trusted Platform Module, trusted platform modules, Trusted Platfrom Modules |
Abstract | Cyber physical systems are the key innovation driver for many domains such as automotive, avionics, industrial process control, and factory automation. However, their interconnection potentially provides adversaries easy access to sensitive data, code, and configurations. If attackers gain control, material damage or even harm to people must be expected. To counteract data theft, system manipulation and cyber-attacks, security mechanisms must be embedded in the cyber physical system. Adding hardware security in the form of the standardized Trusted Platform Module (TPM) is a promising approach. At the same time, traditional dependability features such as safety, availability, and reliability have to be maintained. To determine the right balance between security and dependability it is essential to understand their interferences. This paper supports developers in identifying the implications of using TPMs on the dependability of their system.We highlight potential consequences of adding TPMs to cyber-physical systems by considering the resulting safety, reliability, and availability. Furthermore, we discuss the potential of enhancing the dependability of TPM services by applying traditional redundancy techniques. |
URL | https://ieeexplore.ieee.org/document/8406573 |
DOI | 10.1109/EuroSPW.2018.00026 |
Citation Key | hoeller_trusted_2018 |
- Safety
- Trusted Platfrom Modules
- trusted platform modules
- Trusted Platform Module
- Trusted Computing
- TPMs
- tpm
- system manipulation
- Software
- security of data
- security mechanisms
- security
- secure elements
- Availability
- Resiliency
- Reliability
- Redundancy
- pubcrawl
- Industry 4.0
- Hardware
- embedded systems
- dependability features
- cyber-physical systems
- cyber-attacks
- cyber physical systems
- composability