Visible to the public Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability

TitleTrusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Publication TypeConference Paper
Year of Publication2018
AuthorsHoeller, A., Toegl, R.
Conference Name2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW)
Date Publishedapr
KeywordsAvailability, composability, cyber physical systems, cyber-attacks, Cyber-physical systems, dependability features, Embedded systems, Hardware, Industry 4.0, pubcrawl, Redundancy, reliability, Resiliency, Safety, secure elements, security, security mechanisms, security of data, Software, system manipulation, TPM, TPMs, Trusted Computing, Trusted Platform Module, trusted platform modules, Trusted Platfrom Modules

Cyber physical systems are the key innovation driver for many domains such as automotive, avionics, industrial process control, and factory automation. However, their interconnection potentially provides adversaries easy access to sensitive data, code, and configurations. If attackers gain control, material damage or even harm to people must be expected. To counteract data theft, system manipulation and cyber-attacks, security mechanisms must be embedded in the cyber physical system. Adding hardware security in the form of the standardized Trusted Platform Module (TPM) is a promising approach. At the same time, traditional dependability features such as safety, availability, and reliability have to be maintained. To determine the right balance between security and dependability it is essential to understand their interferences. This paper supports developers in identifying the implications of using TPMs on the dependability of their system.We highlight potential consequences of adding TPMs to cyber-physical systems by considering the resulting safety, reliability, and availability. Furthermore, we discuss the potential of enhancing the dependability of TPM services by applying traditional redundancy techniques.

Citation Keyhoeller_trusted_2018