loading page

Position Paper: On Using Trusted Execution Environment to Secure COTS Devices for Accessing Industrial Control Systems
  • +2
  • Quanqi Ye ,
  • Heng Chuan Tan ,
  • Daisuke Mashima ,
  • Binbin Chen ,
  • Zbigniew Kalbarczyk
Quanqi Ye
Author Profile
Heng Chuan Tan
Advanced Digital Sciences Center

Corresponding Author:[email protected]

Author Profile
Daisuke Mashima
Author Profile
Binbin Chen
Author Profile
Zbigniew Kalbarczyk
Author Profile


Industrial Control Systems (ICS) are traditionally designed to operate in an “air-gapped” environment. With the advent of digital technologies, many ICS are adopting IT solutions to improve interoperability and operational efficiency. Thus, the air-gap assumption no longer holds in practice. Most ICS devices today are modernized with networking capabilities to facilitate system maintenance, upgrades, and troubleshooting. Since these devices are connected to the Internet, ICS networks face the same security threats as regular IT systems. In addition, ICS operators can connect commercial off-the-shelf (COTS) equipment to ICS networks to perform operational tasks. Those COTS devices are usually personal computers or even mobile devices, which can be infected with malware and become weapons against ICS. In this position paper, we examine the design challenges of establishing trust between COTS equipment and ICS. We also present some commonly used security solutions and discuss their deployment challenges due to issues caused by legacy systems. Finally, we introduce the Trusted Execution Environment (TEE), a technology commonly available on modern COTS devices, as a trust anchor for establishing secure communications with the ICS infrastructure. We discuss some research gaps related to the use of TEE and propose some recommendations to guide future research.