White Papers

The Root of Trust: A Foundation for Trusted Computing

July 13, 2017 | BY: Steve Edwards

Download PDF

Ensuring that an embedded system is trustworthy begins with the first instruction on trusted hardware. An effective trusted computing strategy for COTS solutions can include anti-tamper protection that guards against physical hardware intrusion, encryption techniques for critical data at rest, and effective cyberattack protections that ensure that a corrupted BIOS will not cause harm. The first step to ensure that the BIOS is not corrupted is to establish the hardware “Root of Trust.”

Cybersecurity, malware

Air Force weapon systems today are heavily reliant on complex software and high interconnectivity to perform their missions, making it critical to ensure that their software is trusted and secure.

A foundational concept in cybersecurity, the Root of Trust establishes trusted functions, based on hardware validation of the boot process, to ensure that the system’s OS is being started up with uncorrupted code. These functions are located in hardware so they can’t be changed.

Protecting embedded systems against cyberattacks must start with the very first instruction that a processor executes. For Intel®-based embedded hardware, two important weapons in the system designer’s trusted computing arsenal are Intel’s Trusted Execution Technology (TXT) and Boot Guard.

This paper looks at the growing demand for trusted computing solutions with effective protections against cyberattacks in the global defense electronics market. Download our White Paper to learn more about:

Author’s Biography

Steve Edwards

Director, Secure Embedded Solutions & Technical Fellow

Steve has over 25 years of experience in the embedded system industry. He managed and co-designed Curtiss-Wright’s first rugged multiprocessor and FPGA products and was involved in the architecture, management and evangelization of the industry’s first VPX products. Steve has Chaired the VITA 65 working group and currently leads Defense Solutions’ strategic initiative in Anti-Tamper and Cybersecurity. Steve has a Bachelor of Science in Electrical Engineering from Rutgers University.

Share This Article

  • Share on Linkedin
  • Share on Twitter
  • Share on Facebook
  • Share on Google+
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright


Contact our sales team today to learn more about our products and services.





Our support team can help answer your questions - contact us today.