In our previous Trusted Computing white paper, we discussed the importance of secure boot for Trusted Computing. After secure boot is implemented, our focus turns to hardware features built-in to the most popular defense and aerospace processor architectures…