Politecnico di Torino - Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY

+39 011 090 6100 info@tech-share.it

Cybersecurity using processors with trusted memory

CybersecurityReal-time ControlSabotage RecognitionSicurezza informaticaTrusted Memory


The invention consists in a method for the recognition of anomalies of potential cyber-attacks in real-time control systems through trusted-memory processors. The aim of the invention is to check the output values of the controller and to ensure that they are in an acceptable range in order to confirm that the values were not sabotaged during the process.

Technical features

Automation has been a highly topical issue for years. To work properly in an autonomous way, a system needs a control circuit, which can work with an open-ring or a closed-ring This last element is the subject of the present invention: the software of the closed control circuit can be exposed to cyber attacks, which can, in some cases, lead to unproper or dangerous malfunctioning of a machine. The invention consists in a method, which uses trusted-memory processors, for the recognition of anomalies potentially caused by cyber-attacks to control systems in real-time. This is possible through the separation of the code in subsections which are either secure or unsecure. In this way, the output can be verified before it is used by the actuator.

Possible Applications

  • Cyber security for all the systems which implement a closed-ring control systems.


  • The use of trusted memory processors leads to higher security;
  • Only method of this kind in the automotive control system environment.