As modern automotive and industrial products continue to increase in complexity, performance and connectivity, the need for strong embedded cybersecurity solutions has also increased. Given a growing landscape of threat actors, and evolving regulatory requirements across the world, both chip manufacturers and OEMs must adapt and implement stronger product security without compromising performance. To effectively defend against increasingly sophisticated attacks on embedded hardware and software, a multi-layered approach is required. Elements such as a secure root of trust, secure storage, cryptographic acceleration, trusted execution environments, secure key and code provisioning, and run-time context isolation are essential components of cybersecurity in a modern high-performance real-time microcontroller. The AM26x and F29x microcontroller families from Texas Instruments are designed from the ground up to achieve these security goals, while delivering industry-leading performance for real-time applications without compromise.
C2000™ and Sitara™ are trademarks of Texas Instruments.
Arm® and TrustZone® are registered trademarks of Arm Limited (or its subsidiaries) in the US and/or elsewhere.
All trademarks are the property of their respective owners.
Modern automotive and industrial products, from cars and trains to servo drives and server power supply units, have grown in complexity, requiring real-time control solutions with higher performance. At the same time, these products have become highly connected, requiring strong cybersecurity solutions to maintain the confidentiality, integrity, authenticity and availability of hardware and software assets and the systems built around them. Additionally, the security of the application during runtime has come into greater focus, with larger and more complex software stacks leading to increased attack surfaces for potential threat actors.
To effectively defend against increasingly sophisticated modern attacks on embedded hardware and software, a comprehensive multi-layered approach is required, effectively establishing a root of trust, providing secure storage for critical assets such as cryptographic keys, creating trusted execution environments for performing security-sensitive operations, secure key and code provisioning, and run-time context isolation and memory protection to mitigate the potential reach of malware in the system. This white paper examines these subjects, and how secure microcontroller architectures can maximize these cybersecurity objectives without compromising performance.