{"title":"System-on-Chip Security Validation and Recent Trends","authors":"R. V. Navysshree, S. Yadav","doi":"10.1109/RTEICT52294.2021.9573992","DOIUrl":null,"url":null,"abstract":"System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTEICT52294.2021.9573992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.