• DocumentCode
    2641920
  • Title

    Design methods for Security and Trust

  • Author

    Verbauwhede, Ingrid ; Schaumont, Patrick

  • Author_Institution
    ESAT/COSIC, Katholieke Universiteit, Leuven
  • fYear
    2007
  • fDate
    16-20 April 2007
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are often an afterthought. Yet the purpose of ubiquitous electronics is to act and negotiate on their owner s behalf, and this makes trust a first-order concern. We outline a methodology for the design of secure and trusted electronic embedded systems, which builds on identifying the secure-sensitive part of a system (the root-of-trust) and iteratively partitioning and protecting that root-of-trust over all levels of design abstraction. This includes protocols, software, hardware, and circuits. We review active research in the area of secure design methodologies
  • Keywords
    embedded systems; logic design; logic partitioning; security of data; ubiquitous computing; electronic embedded systems; embedded computers design; power-consumption; root-of-trust; secure design methodologies; security design methods; trust design methods; ubiquitous computers design; ubiquitous electronics; Circuits; Costs; Design methodology; Embedded computing; Embedded system; Hardware; Pervasive computing; Power system security; Protection; Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design, Automation & Test in Europe Conference & Exhibition, 2007. DATE '07
  • Conference_Location
    Nice
  • Print_ISBN
    978-3-9810801-2-4
  • Type

    conf

  • DOI
    10.1109/DATE.2007.364671
  • Filename
    4211876