Trusted computing architecture for secure SOC

Yuanman Tong,Hongyi Lu,Zhiying Wang,Kui Dai
2008-01-01
Abstract:The trusted computing architecture for secure system on chip (SOC) is presented to solve some complicated issues of information security. The keys of trusted computing architecture are security zones and security auditing module. The security zones include trusted base, secure operating system, trusted application and un-trusted application. The different security zones are statically and dynamically isolated. The predefined security rules are assured by security auditing module. Based on the architecture, the extension of the architecture is presented to resist side channel attacks and physical attacks and to avoid the risk of being fabricated and purloined.
What problem does this paper attempt to address?