Reusable hardware Intellectual Property (IP)-based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design and verification cost while meeting aggressive time-to-market constraints. Growing reliance on these pre-verified hardware IPs, often gathered from untrusted third-party vendors, severely affects the security and trustworthiness of SoC computing platforms. An important emerging concern with the hardware IPs acquired from external sources is that they may come with deliberate malicious implants to incorporate undesired functionality, undocumented test and debug interface working as hidden backdoor, or other integrity issues. This chapter describes various security and trust vulnerabilities in third-party hardware IPs.
CITATION STYLE
Mishra, P., Tehranipoor, M., & Bhunia, S. (2017). Security and trust vulnerabilities in third-party IPs. In Hardware IP Security and Trust (pp. 3–14). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_1
Mendeley helps you to discover research relevant for your work.