片上系统安全验证及最新趋势

R. V. Navysshree, S. Yadav
{"title":"片上系统安全验证及最新趋势","authors":"R. V. Navysshree, S. Yadav","doi":"10.1109/RTEICT52294.2021.9573992","DOIUrl":null,"url":null,"abstract":"System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"System-on-Chip Security Validation and Recent Trends\",\"authors\":\"R. V. Navysshree, S. Yadav\",\"doi\":\"10.1109/RTEICT52294.2021.9573992\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.\",\"PeriodicalId\":191410,\"journal\":{\"name\":\"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)\",\"volume\":\"151 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RTEICT52294.2021.9573992\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTEICT52294.2021.9573992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

片上系统(SoC)技术是当今每个现代计算设备不可或缺的一部分。不用说,SoC驱动的小工具存储和管理着我们的一些(如果不是全部的话)敏感知识资产,无论是在我们的个人、财务和/或亲密的生理信息领域。在这个数据唾手可得的时代,隐私和数据安全是至关重要的,解决这一问题的需求也迅速渗透到硬件领域。由于电子工业的快速发展模式和蓬勃发展,外包和购买第三方的硬件知识产权(IP)以其方便和经济效益成为一种普遍的做法。然而,这大大增加了通过这些第三方ip将安全漏洞(如硬件木马和其他恶意组件)引入系统的风险。因此,硬件系统的安全性验证最近在硬件系统设计和开发生命周期中获得了更高的地位。本文的主要目的是研究和调查各种安全验证方法,当前的挑战和在现有系统中观察到的差距,以期加强安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
System-on-Chip Security Validation and Recent Trends
System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信