DocumentCode :
3478840
Title :
Tutorial T9: Designing Secure SoCs
fYear :
2013
fDate :
5-10 Jan. 2013
Abstract :
Summary form only given, as follows. The expanding reach and pervasiveness of personal and embedded computing are accompanied by proportional increases in concerns about information security. Embedded computing systems are being used in critical applications (medical electronics, automotive systems, and avionics, manufacturing control, smart grid), where the consequence of security attacks can be severe. Furthermore, several business models (e.g., e-commerce, distribution of multimedia content, etc.) require an adequate level of security in the associated electronic systems in order to be viable. On the other hand, the increasing complexity and networked nature of embedded systems have led to more vulnerabilities that can be more easily targeted for security attacks. If our past experience is any indication, conventional approaches to security or simple add-on security schemes are insufficient. Adequate security can be achieved in a system only if security is considered throughout the design process, including the design of the system-on-chips (SoCs) (hardware and embedded software). It is therefore imperative that SoC architects, HW designers, and embedded SW developers be aware of the security challenges and techniques to address them. This tutorial will introduce security challenges in embedded systems, identify the security requirements for SoCs that they contain, and present approaches to designing secure SoCs. Secure SoC design will be described as an attempt to bridge three "design gaps" - the assurance gap, performance gap, and battery gap. Examples from various state-of-the-art commercial SoCs will be used to illustrate the presented concepts. The tutorial is organized into five parts. Part 1 will focus on security concerns and challenges in secure SoC design. Part 2 will describe HW architectures for efficient security processing. Parts 3 and 4 will delve into the realm of SW and HW/side-channel attacks, and design countermeasures against them. Part 5 wil- talk about attacks on the design process (HW Trojans) and defenses against them.
Keywords :
Awards activities; Educational institutions; Embedded systems; Security; System-on-chip; Tutorials; Very large scale integration;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
VLSI Design and 2013 12th International Conference on Embedded Systems (VLSID), 2013 26th International Conference on
Conference_Location :
Pune
ISSN :
1063-9667
Print_ISBN :
978-1-4673-4639-9
Type :
conf
DOI :
10.1109/VLSID.2013.144
Filename :
6472705
Link To Document :
بازگشت