Loading…

A Comprehensive Survey of TPM for Defense Systems

Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are...

Full description

Saved in:
Bibliographic Details
Published in:KSII transactions on Internet and information systems 2024-07, Vol.18 (7), p.1953-1967
Main Authors: Cheol Ryu, Jae-ho Lee, Do-hyung Kim, Hyung-seok Lee, Young-sae Kim, Jin-hee Han, Jeong-nyeo Kim
Format: Article
Language:Korean
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.
ISSN:1976-7277
1976-7277