IEEE Access Special Section Editorial: Security and reliability aware system design for mobile computing devices
IEEE Access Special Section Editorial: Security and reliability aware system design for mobile computing devices
It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself as an inevitable solution for faster and efficient design. In this global design supply chain, the design of mobile computing devices relies heavily on reusable Intellectual Property (IP) cores as a practical solution. However, such IP cores are becoming increasingly vulnerable to malicious activities, attacks and threats. Any form of third party intervention in the design process can raise grave security concerns about the system. Security issues in IP’s can be in the form of IP piracy/IP counterfeit or embedded malicious logic or information leakage. The first form of security countermeasure requires anti-piracy methodologies that can nullify false claims of ownership or detect unauthorized pirated designs. The second form of threat, which is often called a ‘hardware Trojan’, is the deliberate insertion of illicit hardware into the IP design by a rogue designer or vendor, also requires detection/correction strategies as a security countermeasure.
2976-2980
Sengupta, Anirban
b9dc6a72-89e4-473e-a63c-5e760fd82002
Mohanty, Saraju P.
5e933cb9-dac5-47af-87c2-5871d2a9b42c
Lombardi, Fabrizio
e36a0194-d0fc-443b-82c5-72cefd730b0f
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
6 June 2016
Sengupta, Anirban
b9dc6a72-89e4-473e-a63c-5e760fd82002
Mohanty, Saraju P.
5e933cb9-dac5-47af-87c2-5871d2a9b42c
Lombardi, Fabrizio
e36a0194-d0fc-443b-82c5-72cefd730b0f
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Sengupta, Anirban, Mohanty, Saraju P., Lombardi, Fabrizio and Zwolinski, Mark
(2016)
IEEE Access Special Section Editorial: Security and reliability aware system design for mobile computing devices.
IEEE Access, 4, , [7505461].
(doi:10.1109/ACCESS.2016.2580465).
Abstract
It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself as an inevitable solution for faster and efficient design. In this global design supply chain, the design of mobile computing devices relies heavily on reusable Intellectual Property (IP) cores as a practical solution. However, such IP cores are becoming increasingly vulnerable to malicious activities, attacks and threats. Any form of third party intervention in the design process can raise grave security concerns about the system. Security issues in IP’s can be in the form of IP piracy/IP counterfeit or embedded malicious logic or information leakage. The first form of security countermeasure requires anti-piracy methodologies that can nullify false claims of ownership or detect unauthorized pirated designs. The second form of threat, which is often called a ‘hardware Trojan’, is the deliberate insertion of illicit hardware into the IP design by a rogue designer or vendor, also requires detection/correction strategies as a security countermeasure.
This record has no associated files available for download.
More information
Published date: 6 June 2016
Organisations:
University of Southampton
Identifiers
Local EPrints ID: 411063
URI: http://eprints.soton.ac.uk/id/eprint/411063
PURE UUID: a1d38145-cf2e-4247-b085-2b9daf3e2396
Catalogue record
Date deposited: 13 Jun 2017 16:32
Last modified: 06 Jun 2024 01:32
Export record
Altmetrics
Contributors
Author:
Anirban Sengupta
Author:
Saraju P. Mohanty
Author:
Fabrizio Lombardi
Author:
Mark Zwolinski
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics