A hardware root of trust (HRoT) creates a strong foundation for system security, reducing the likelihood of full system compromise. While a HRoT provides valuable security features, it is important to ensure that they are secure features. Vulnerabilities can have a major impact, including:
- Unprivileged access to your customers’ proprietary or confidential data
- Side-channel leakages of critical customer information
- Unauthorized access to device keys, allowing adversaries to steal
- Modifications of authentication keys for execution of unauthorized software