H. Yasuura, N. Takagi, S. Ravi, M. Torla, C. Gebotys
{"title":"专题讨论:SoC的安全性","authors":"H. Yasuura, N. Takagi, S. Ravi, M. Torla, C. Gebotys","doi":"10.1145/581199.581242","DOIUrl":null,"url":null,"abstract":"SoC is one of the important components of social and personal information systems, which directly influence with our life, property and privacy Security technology is now embedded into various hardware and software of SoC and SoC designers should be concerned with security issues. Cryptography requires heavy computation and wireless communication requests architecture and protocols for security. In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC. In this panel, we will have discussions on the security on SoC from various viewpoints. System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure system synthesis.","PeriodicalId":413693,"journal":{"name":"15th International Symposium on System Synthesis, 2002.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Special session: security on SoC\",\"authors\":\"H. Yasuura, N. Takagi, S. Ravi, M. Torla, C. Gebotys\",\"doi\":\"10.1145/581199.581242\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"SoC is one of the important components of social and personal information systems, which directly influence with our life, property and privacy Security technology is now embedded into various hardware and software of SoC and SoC designers should be concerned with security issues. Cryptography requires heavy computation and wireless communication requests architecture and protocols for security. In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC. In this panel, we will have discussions on the security on SoC from various viewpoints. System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure system synthesis.\",\"PeriodicalId\":413693,\"journal\":{\"name\":\"15th International Symposium on System Synthesis, 2002.\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"15th International Symposium on System Synthesis, 2002.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/581199.581242\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"15th International Symposium on System Synthesis, 2002.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/581199.581242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SoC is one of the important components of social and personal information systems, which directly influence with our life, property and privacy Security technology is now embedded into various hardware and software of SoC and SoC designers should be concerned with security issues. Cryptography requires heavy computation and wireless communication requests architecture and protocols for security. In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC. In this panel, we will have discussions on the security on SoC from various viewpoints. System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure system synthesis.