Security Policy Enforcement In Modern Soc Designs
Abstract
Modern SoC designs contain a large number of sensitive assets that must be protected from unauthorized access. Authentication mechanisms which control the access to such assets are governed by complex security policies. The security policies affect multiple design blocks and may involve subtle interactions among hardware, firmware, OS kernel, and applications. The implementation of security policies in an SoC design, often referred to as its security architecture, is a subtle composition of coordinating design modules distributed across the different IPs. Toward this direction, this paper gives an overview of SoC security architectures in modern SoC designs and provides a glimpse of their implementation, as well as their design complexities and functional shortcomings. Design of security architectures involves a complex interplay of requirements from functionality, power, security, and validation. We also outline some of the research needs in the area for developing robust, trustworthy SoC designs.
Publication Date
1-5-2016
Publication Title
2015 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2015
Number of Pages
345-350
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICCAD.2015.7372590
Copyright Status
Unknown
Socpus ID
84964562203 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/84964562203
STARS Citation
Ray, Sandip and Jin, Yier, "Security Policy Enforcement In Modern Soc Designs" (2016). Scopus Export 2015-2019. 4403.
https://stars.library.ucf.edu/scopus2015/4403