Keynote Speakers

KEYNOTES

RISC-V Trusted Platform Module (TPM)
and Trusted Execution Environment (TEE)

Trong-Thuc Hoang and Cong-Kha Pham
University of Electro-Communications (UEC), Tokyo, Japan

Abstract. There are five pillars in cybersecurity: confidentiality, integrity, availability, authentication, and non-repudiation. It is very challenging to achieve all five requirements for a cryptosystem. In most cases, confidentiality, integrity, and authentication are the most important and most needed. Among those three, authentication has the highest priority because it lays the foundation for others to be built. For hardware devices, Trusted Platform Module (TPM) is the solution for authentication and integrity problems. The most important feature of TPM is the remote attestation. Using remote attestation, users and developers can identify a device and verify its integrity, thus proving that the device is clean. Based on TPM, other confidentiality, integrity, and availability applications can be developed. Trusted Execution Environment (TEE) is the next step after TPM. By definition, TEE is a hidden Operating System (OS) running in parallel with the primary OS, such as Linux or Windows, to guarantee the safety of some crucial programs. To put it simply, TPM is for a trusted hardware device, and TEE is for a trusted OS. TEE needs TPM to provide the Root-of-Trust (RoT). Based on the RoT, a Chain-of-Trust (CoT) is developed, thus creating TEE. In other words, RoT is the first authentication right after reset, providing a concrete foundation for TEE to be built. For security reasons, authenticating RoT should be done not only during the boot process but also by hardware, partially or entirely. However, conventional computer systems usually have proprietary issues, mainly related to processors or their Instruction Set Architectures (ISAs). Recently, with the emergence of RISC-V, an open-source ISA, now is the opportunity for hardware developers to gain the upper hand. With a highly customizable architecture and a solid open-source community, RISC-V is currently the best solution for customizing computer systems for security-related applications. This talk will provide an example design of a secure boot RISC-V computer system for TPM and TEE applications.

TRONG-THUC HOANG received a B.Sc. and M.S. degree in electronic engineering from the Ho Chi Minh City University of Science (HCMUS), Ho Chi Minh City, Vietnam, in 2012 and 2017, respectively, and a Ph.D. degree in engineering from The University of Electro-Communications (UEC), Tokyo, Japan, in 2022. From 2012 to 2017, he was a Lecturer Assistant at HCMUS. From 2019 to 2020, he was a Research Assistant at UEC. From 2019 to 2022, he was a Research Assistant at the Cyber-Physical Security Research Center (CPSEC), National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan. Since April 2022, he has been an Assistant Professor with the Department of Computer and Network Engineering, UEC. His research interests include digital signal processing, computer architecture, cyber-security, and ultra-low power systems-on-a-chip.

CONG-KHA PHAM received a B.S., M.S., and Ph.D. in electronics engineering from Sophia University, Tokyo, Japan. He is currently a Professor at the Department of Information and Network Engineering, The University of Electro-Communications (UEC), Tokyo. His research interest includes designing analog and digital systems using integrated circuits. His current research involves designing hardware systems and implementing FPGA and integrated circuits. His recent projects are an energy harvest power supply, a low-power data-centric sensor network, the development of long-distance transmission/miniaturization equipment for sensor networks, a super low-voltage device project, and research on a memory-based information detection system. Pham Laboratory at UEC teaches the design, implementation, and evaluation of hardware systems and VLSI, aiming for System-on-Chip.