A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack, encrypts critical data at rest, and ensures that a corrupted BIOS will not damage a system. These capabilities are enabled by trusted functions that are stored in hardware, and therefore can’t be changed.
Engineers building Intel® processor-based systems need look no further than Intel® Trusted Execution Technology (Intel® TXT) and Boot Guard to implement a Root of Trust in their next design.
In this white paper, aerospace and defense engineers will learn:
The basics of a Root of Trust
How Intel® TXT and Boot Guard help establish a Root of Trust in embedded systems
About off-the-shelf processor modules with these security features designed in
Congatec Demos Edge Server Tech at embedded world 2018
Are you interested in high-bandwidth, real-time communication edge servers in a small form factor? Then you...
Next White Paper
Unlock the Benefits of Predictive Maintenance with Edge Computing
Would you like to hear from a company featured in this article?