Security and trust vulnerabilities in third-party IPs

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Reusable hardware Intellectual Property (IP)-based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design and verification cost while meeting aggressive time-to-market constraints. Growing reliance on these pre-verified hardware IPs, often gathered from untrusted third-party vendors, severely affects the security and trustworthiness of SoC computing platforms. An important emerging concern with the hardware IPs acquired from external sources is that they may come with deliberate malicious implants to incorporate undesired functionality, undocumented test and debug interface working as hidden backdoor, or other integrity issues. This chapter describes various security and trust vulnerabilities in third-party hardware IPs.

Cite

CITATION STYLE

APA

Mishra, P., Tehranipoor, M., & Bhunia, S. (2017). Security and trust vulnerabilities in third-party IPs. In Hardware IP Security and Trust (pp. 3–14). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free