Whether it's a private encryption key for mobile payments, a milaero communications system, or a patient's therapeutic parameters; verification of hardware access to secure storage elements is a challenging and critical task. For safety critical systems in addition to risks from external hacking, designers must ensure unexpected side-effects or bugs cannot inadvertently corrupt critical data. This session will discuss how the Secure Check app can be the foundation of your "root of trust".