Chrome Extension
WeChat Mini Program
Use on ChatGLM

The Research and Application of Trusted Startup of Embedded TPM

Cybersecurity and Cyberforensics Conference(2020)

Cited 2|Views7
No score
Abstract
In view of the security threats caused by the code execution vulnerability of the industrial control system, design the trusted security architecture of the industrial control system based on the embedded system. From the trusted startup of industrial control equipment, the safety protection for industrial control system is completed. The scheme is based on TPM and Xilinx Zynq-7030 to build an industrial trusted computing environment and complete the trusted startup process. Experiment shows that this method can effectively prevent the destruction of malicious code during the startup process of embedded system and provide technical support for the construction of trusted computing environment of industrial control system.
More
Translated text
Key words
Trusted computing environment,Industrial control system,Trusted startup,Embedded system
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined