首页> 外文会议>IEEE/ACM International Conference on Computer-Aided Design >Security Policy Enforcement in Modern SoC Designs--Invited Paper
【24h】

Security Policy Enforcement in Modern SoC Designs--Invited Paper

机译:现代SoC设计中的安全策略实施 - 邀请纸张

获取原文
获取外文期刊封面目录资料

摘要

Modern SoC designs contain a large number of sensitive assets that must be protected from unauthorized access. Authentication mechanisms which control the access to such assets are governed by complex security policies. The security policies affect multiple design blocks and may involve subtle interactions among hardware, firmware, OS kernel, and applications. The implementation of security policies in an SoC design, often referred to as its security architecture, is a subtle composition of coordinating design modules distributed across the different IPs. Toward this direction, this paper gives an overview of SoC security architectures in modern SoC designs and provides a glimpse of their implementation, as well as their design complexities and functional shortcomings. Design of security architectures involves a complex interplay of requirements from functionality, power, security, and validation. We also outline some of the research needs in the area for developing robust, trustworthy SoC designs.
机译:现代SOC设计包含大量必须免受未经授权访问的敏感资产。验证机制控制对此类资产的访问受到复杂安全策略的控制。安全策略影响多个设计块,可能涉及硬件,固件,OS内核和应用之间的微妙交互。在SoC设计中实施安全策略通常称为其安全架构,是一种微妙的协调设计模块,其分布在不同的IPS上。朝着这个方向走向这个方向,概述了现代SoC设计中的SoC安全架构,并提供了对其实现的一瞥,以及他们的设计复杂性和功能性缺点。安全架构的设计涉及从功能,电源,安全性和验证的复杂相互作用。我们还概述了该领域的一些研究需求,以开发强大,值得信赖的SoC设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号