Security¶
This section highlights the security features offered by Intel® Robotics SDK and provides an overview of the security features. For further reading, refer to the specific documents listed below.
Shim Layer - Protect your application data¶
The Robotics SDK includes open-source components, which may be affected by vulnerabilities. A shim layer can help to protect your program data against an attack initiated via these vulnerabilities.
The main task of the shim layer is to reduce the attack surface by verifying the data (such as size, value range, memory range, etc.) transferred via a function call to or from a library or an executable and protect the customer code and data via this mechanism.
Due to architecture constraints, only the developer of the application code can implement the matching shim layer correctly.
The following picture shows a potential implementation of a shim layer around the customer application like a shell.

Keep in mind, complex checks and more layers might have an impact on the overall system performance.
In general, it is highly recommended to check regularly for updates and vulnerabilities on the component web sites.
Intel® Robotics SDK Platform¶
The main Robotics SDK platform is based on the 12th generation Intel® Core™ processor with accelerators primarily used for AI inference and vision processing. The platform inherits many security elements from the processor.
Security Use Cases and Features¶
The Robotics SDK platform offers various security features that customers can leverage in the context of Autonomous Robotics Applications. They are listed as follows:
Secure Boot
Ensure the system boots from a trusted source and is not manipulated by an attacker. To establish a secure boot, a chain of trust is set up; the root-of trust is unmodifiable by nature. Typically, the root-of trust is a key burned in fuses in the device or ROM based program code.
Intel devices support secure boot with Intel® Trusted Execution Technology (Intel® TXT) and offers via the Intel® CSME, a software implementation of the Trusted Platform Module (TPM).
More information about the described use cases and features can be found in the following documents:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Intel® Converged Boot Guard and Intel® Trusted Execution Technology (Intel® TXT) |
575623 |
|
Tiger Lake platform - Firmware Architecture Specification |
608531 |
|
Intel® Trusted Execution Technology (Intel® TXT) DMA Protection Ranges |
633933 |
|
Intel® Trusted Execution Technology (Intel® TXT) Enabling Guide |
– |
|
Trusted Platform Module Specification |
– |
Authentication
Authentication helps to develop a secure system. A run-time authentication system is the next step following secure boot. Any program code can be authenticated before it is executed by the system. This powerful tool enables AMR suppliers to guarantee a level of security, and safety during run-time. Executing code from an unknown source or malware would not be possible.
The Intel® Dynamic Application Loader (Intel® DAL) is a feature of Intel® platforms that allows you to run small portions of Java* code on Intel® Converged Security and Management Engine (Intel® CSME) firmware. Intel has developed DAL Host Interface Daemon (also known as JHI), which contains the APIs that enable a Linux* operating system to communicate with Intel DAL. The daemon is available both in a standalone software package and as part of the Linux* Yocto 64-bit distribution.
More information about the described use cases and features can be found in the following documents:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Trusty TEE Software Architecture Specification |
607736 |
|
Intel® Dynamic Application Loader (Intel® DAL) Developer Guide |
– |
https://www.intel.com/content/www/us/en/develop/documentation/dal-developer-guide/top.html |
Virtualization
Virtualization is another important element to increase the level of security and safety. It helps to establish freedom from interference (FFI), as it’s requested for safety use cases, and workload consolidation. Intel devices have supported this use case with Intel® Virtualization Technology (Intel® VT) for decades.
More information about the described use cases and features can be found in the following documents:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Intel® 64 and IA-32 Architectures Software Developer Manuals |
– |
https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html |
Encryption
Encryption is required for many security use cases. The Robotics SDK platform supports the common encryption algorithms like AES or RSA in hardware. This increases the encryption/decryption performance and the security level. Typical use cases are the encryption of communication messages, a file system, or single files for IP protection or the creation of a secure storage for security relevant data like crypto keys or passwords. Another use case is memory encryption; the EI for AMR platform supports this with the Total Memory Encryption (TME) feature.
More information about the described use cases and features can be found in the following documents:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Tiger Lake platform Intel® Total Memory Encryption (Intel® TME) |
620815 |
|
Whitley Platform Memory Encryption Technologies -TME/MK-TME deep Dive |
611211 |
|
Intel® 64 and IA-32 Architectures Software Developer Manuals |
– |
https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html |
Filesystem-level encryption (Linux*) |
– |
https://www.kernel.org/doc/html/v4.16/filesystems/fscrypt.html |
Intel® Advanced Encryption Standard Instructions (AES-NI) |
– |
Firmware Update
To improve the security and safety status over the lifetime of a device, the internal firmware (e.g. BIOS) must be updatable. In this case the update packages are signed by the supplier (e.g. Intel, OEM etc.).
More information about the described use cases and features can be found in the following document:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Tiger Lake platform - Firmware Architecture Specification |
608531 |
Secure Debug
Debugging is an important feature during product development. During in-field usage, debugging might also be needed to analyze field returns. To prevent anyone from accessing internal resources via the debugger, a secure debugging system is developed. In this case an engineer who wants to use the debugger has to authenticate via a valid token which has to be offered to the system (e.g. storing it in flash). Tokens must be signed by a key which was stored during manufacturing flow into the device fuses.
More information about the described use cases and features can be found in the following documents:
Document Title |
Intel Document ID |
Document Link |
---|---|---|
Tiger Lake platform - Firmware Architecture Specification |
608531 |
|
Tiger Lake platform enDebug User Guide |
630604 |
|
Anderson Lake Secure Debug User Guide |
614222 |