Validation of ip security and trust

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

System-on-chip (SoC) designers may have to outsource Intellectual Properties (IPs) to meet time-to-market constraints. The IPs may be collected from untrusted third parties and it raises major security concerns. An adversary can embed malicious components that are hard to detect. However, when the malicious components are triggered, the correct functionality of the design is deviated and critical information such as secret keys may be leaked. Therefore, it is vital to validate IPs from security aspects alongside with functionality, timing, and other requirements. In this chapter, we review the existing security validation methods for soft IP cores using a combination of simulation-based validation and formal methods.

Cite

CITATION STYLE

APA

Farahmandi, F., & Mishra, P. (2017). Validation of ip security and trust. In Hardware IP Security and Trust (pp. 187–205). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free