Title :
Design methods for Security and Trust
Author :
Verbauwhede, Ingrid ; Schaumont, Patrick
Author_Institution :
ESAT/COSIC, Katholieke Universiteit, Leuven
Abstract :
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are often an afterthought. Yet the purpose of ubiquitous electronics is to act and negotiate on their owner s behalf, and this makes trust a first-order concern. We outline a methodology for the design of secure and trusted electronic embedded systems, which builds on identifying the secure-sensitive part of a system (the root-of-trust) and iteratively partitioning and protecting that root-of-trust over all levels of design abstraction. This includes protocols, software, hardware, and circuits. We review active research in the area of secure design methodologies
Keywords :
embedded systems; logic design; logic partitioning; security of data; ubiquitous computing; electronic embedded systems; embedded computers design; power-consumption; root-of-trust; secure design methodologies; security design methods; trust design methods; ubiquitous computers design; ubiquitous electronics; Circuits; Costs; Design methodology; Embedded computing; Embedded system; Hardware; Pervasive computing; Power system security; Protection; Protocols;
Conference_Titel :
Design, Automation & Test in Europe Conference & Exhibition, 2007. DATE '07
Conference_Location :
Nice
Print_ISBN :
978-3-9810801-2-4
DOI :
10.1109/DATE.2007.364671