Security Policy Enforcement In Modern Soc Designs

Abstract

Modern SoC designs contain a large number of sensitive assets that must be protected from unauthorized access. Authentication mechanisms which control the access to such assets are governed by complex security policies. The security policies affect multiple design blocks and may involve subtle interactions among hardware, firmware, OS kernel, and applications. The implementation of security policies in an SoC design, often referred to as its security architecture, is a subtle composition of coordinating design modules distributed across the different IPs. Toward this direction, this paper gives an overview of SoC security architectures in modern SoC designs and provides a glimpse of their implementation, as well as their design complexities and functional shortcomings. Design of security architectures involves a complex interplay of requirements from functionality, power, security, and validation. We also outline some of the research needs in the area for developing robust, trustworthy SoC designs.

Publication Date

1-5-2016

Publication Title

2015 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2015

Number of Pages

345-350

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/ICCAD.2015.7372590

Socpus ID

84964562203 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/84964562203

This document is currently not available here.

Share

COinS