TY - GEN
T1 - Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures
AU - Ehret, Alan
AU - Moore, Peter
AU - Stojkov, Milan
AU - Kinsy, Michel A.
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Operational technology (OT) systems use hardware and software to monitor and control physical processes, devices, and infrastructure - often critical infrastructures. The convergence of information technology (IT) and OT has significantly heightened the cyber threats in OT systems. Although OT systems share many of the hardware and software components in IT systems, these components often operate under different expectations. In this work, several hardware root-of-trust architectures are surveyed and the attacks each one mitigates are compared. Attacks spanning the design, manufacturing, and deployment life cycle of safety-critical operational technology are considered. The survey examines architectures that provide a hardware root-of-trust as a peripheral component in a larger system, SoC architectures with an integrated hardware root-of-trust, and FPGA-based hardware root-of-trust systems. Each architecture is compared based on the attacks mitigated. The comparison demonstrates that protecting operational technology across its complete life cycle requires multiple solutions working in tandem.
AB - Operational technology (OT) systems use hardware and software to monitor and control physical processes, devices, and infrastructure - often critical infrastructures. The convergence of information technology (IT) and OT has significantly heightened the cyber threats in OT systems. Although OT systems share many of the hardware and software components in IT systems, these components often operate under different expectations. In this work, several hardware root-of-trust architectures are surveyed and the attacks each one mitigates are compared. Attacks spanning the design, manufacturing, and deployment life cycle of safety-critical operational technology are considered. The survey examines architectures that provide a hardware root-of-trust as a peripheral component in a larger system, SoC architectures with an integrated hardware root-of-trust, and FPGA-based hardware root-of-trust systems. Each architecture is compared based on the attacks mitigated. The comparison demonstrates that protecting operational technology across its complete life cycle requires multiple solutions working in tandem.
UR - http://www.scopus.com/inward/record.url?scp=85182597554&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85182597554&partnerID=8YFLogxK
U2 - 10.1109/HPEC58863.2023.10363457
DO - 10.1109/HPEC58863.2023.10363457
M3 - Conference contribution
AN - SCOPUS:85182597554
T3 - 2023 IEEE High Performance Extreme Computing Conference, HPEC 2023
BT - 2023 IEEE High Performance Extreme Computing Conference, HPEC 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 IEEE High Performance Extreme Computing Conference, HPEC 2023
Y2 - 25 September 2023 through 29 September 2023
ER -