
the main CPU Cores, require concurrent security sup-
port by services of the Secure OS. As a result, the new
Secure OS of an integrated solution needs to be capa-
ble of high data rates, multitasking, and concurrent
process execution. Secure concurrent communication
over the Internet Protocol (IP) e.g. Transport Layer
Security (TLS) requires the support of asynchronous
encryption and decryption processes performed in the
Secure OS.
Figure 1: Separate Secure Element attached to a larger
System-on-Chip vs. System-on-Chip-integrated Security.
Another difference between a TPM Firmware and
a Secure OS for the SoC integration is the boot pro-
cess. The SoC-integrated Secure OS is powered
up together with the whole SoC firmware and ri-
chOS/RTOS. This results in a new highly security-
critical dependency on the whole boot process and
power management of the SoC. The integrity of the
Secure OS needs to be verified during the SoC’s Se-
cure Boot to ensure that no software is loaded, that
has been modified by an attacker.
In comparison to a TPM chip with integrated Non-
Volatile Memory (NVM), integrated flash memory
and One-Time-Programmable (OTP) memory are ex-
pensive resources on a generic purpose SoC. For this
reason, many low-end SoCs rely on external flash
connected with a high bandwidth interface to the SoC,
which is function-wise not a big difference. From a
security perspective, the Secure OS code and data are
highly exposed in this external flash memory and can
only be stored encrypted. The used encryption tech-
nology needs to be highly flexible and secure because
flexible swap-in and swap-out processes have to be
supported. Leakage of information during read and
write cycles to external memory has to be avoided,
especially during the execution of critical crypto rou-
tines. As a result, the Secure OS architecture has to
take into consideration the en-/decryption of external
storage, especially with the design of crypto routines.
Another memory-related difference is the neces-
sity for monotonic counters in a Secure OS. A retry
count for a PIN Unlock Key (PUK) (PIN can be un-
blocked, but not PUK) is probably the most famous
kind of a monotonic counter, but there are many other
security use cases, that require a certain security state
that cannot be reverted. A TPM, which is a special
type of Smart Card controller, implements monotonic
counters in a secure NVM protected together with
the secure microcontroller. Such a design is with a
larger generic purpose SoC not possible. Moreover,
expensive OTP memory is in a very low amount avail-
able, which is not sufficient to secure all the required
state machines and atomic processes. As a conse-
quence, new ways to implement the security feature
“monotonic counters” are required on a SoC (Win-
bond, 2018).
Also, new ways to achieve tamper-resistance of
a SoC are required, which a TPM has already per
se. Similar to a Smart Card semiconductor, security-
relevant structures have to be protected by active mea-
surements such as metal shielding, a scrambled data
bus, or sensors for detecting an attack. It is obvious
that this bears some challenges for the chip design and
also the generic silicon manufacturing process (Arm,
2018).
In addition, the generic SoC manufacturing lines
have to be ramped up to create the necessary secu-
rity foundation cryptographic- and security-wise, es-
pecially for the previously mentioned Secure Boot
process (IAR, 2018a). The creation of the so-called
Root-of-Trust (RoT) forms the security foundation for
a Secure Boot and all the other later required security
processes, as well as for deploying and loading the
Secure OS and the required individualization and per-
sonalization processes. Since devices such as wear-
ables, smartphones, or IoT sensors can be personal-
ized in a much later stage, this RoT ensures a robust
device identity and allows an attestation service to
prove the integrity of the device’s software, especially
the Secure OS.
3 ARCHITECTURAL CONCEPTS
3.1 Architectural Aspects Related to a
Secure OS
All the previously described differences between sep-
arate TPM and SoC-integrated security OSs make it
obvious that there is an impact on OS architecture,
which cannot be ignored (Spitz, 2012). One of the
most obvious changes in the Secure OS architecture
is the introduction of an OS kernel in conjunction
with multitasking capabilities. A hardened µKernel
seems to be a good fit for an integrated security solu-
tion, especially as the process isolation and minimal
size contribute to security and robustness. A standard
Silicon-Integrated Security Solutions Driving IoT Security
399