DocumentCode :
3723359
Title :
Security policy enforcement in modern SoC designs
Author :
Sandip Ray;Yier Jin
Author_Institution :
Strategic CAD Labs, Intel Corporation, Hillsboro, OR 97124, USA
fYear :
2015
Firstpage :
345
Lastpage :
350
Abstract :
Modern SoC designs contain a large number of sensitive assets that must be protected from unauthorized access. Authentication mechanisms which control the access to such assets are governed by complex security policies. The security policies affect multiple design blocks and may involve subtle interactions among hardware, firmware, OS kernel, and applications. The implementation of security policies in an SoC design, often referred to as its security architecture, is a subtle composition of coordinating design modules distributed across the different IPs. Toward this direction, this paper gives an overview of SoC security architectures in modern SoC designs and provides a glimpse of their implementation, as well as their design complexities and functional shortcomings. Design of security architectures involves a complex interplay of requirements from functionality, power, security, and validation. We also outline some of the research needs in the area for developing robust, trustworthy SoC designs.
Keywords :
"IP networks","Authentication","Cryptography","Fabrics","Fuses","Access control"
Publisher :
ieee
Conference_Titel :
Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on
Type :
conf
DOI :
10.1109/ICCAD.2015.7372590
Filename :
7372590
Link To Document :
بازگشت