ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article A Comprehensive Survey of TPM for Defense Systems
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Cheol Ryu, Jae-Ho Lee, Do-Hyung Kim, Hyung-Seok Lee, Young-Sae Kim, Jin-Hee Han, Jeong-nyeo Kim
Issue Date
2024-07
Citation
KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967
ISSN
1976-7277
Publisher
한국인터넷정보학회
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.3837/tiis.2024.07.012
Abstract
Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.
KSP Keywords
Conventional Software, Defense system, Hardware Security Module, Hardware and software, Software Tampering, Software-based techniques, intelligent systems, trusted platform module