2021
DOI: 10.1109/tcad.2020.3019772
|View full text |Cite
|
Sign up to set email alerts
|

Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…In this way, shared software and hardware resources and information can be provided to computers and other devices on demand. The needs of a large number of users can be met [ 16 , 17 ]. Tan et al [ 17 ] use virtualization mode to improve processing efficiency.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, shared software and hardware resources and information can be provided to computers and other devices on demand. The needs of a large number of users can be met [ 16 , 17 ]. Tan et al [ 17 ] use virtualization mode to improve processing efficiency.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The needs of a large number of users can be met [ 16 , 17 ]. Tan et al [ 17 ] use virtualization mode to improve processing efficiency. Users can use cloud computing through the network, and each request is distributed to multiple servers [ 18 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Dessouky et al [6] constructed a testbed for software-exploitable register-transfer level bugs to analyse the effectiveness of the latest security verification methods and identify the specific classes of vulnerabilities that these methods fail to detect. Tan et al [7] proposed monitoring and mitigation patch blocks to provide a defence against intellectual property (IP) centric security issues, focussing on situations where a system integrator only has interface-level visibility of the third-party IP designs. Zhu et al [8] proposed an approach as well as a secure architecture that monitors the central processing unit (CPU) at run-time from outside of the CPU chip.…”
Section: Related Studiesmentioning
confidence: 99%
“…Tan et al. [7] proposed monitoring and mitigation patch blocks to provide a defence against intellectual property (IP) centric security issues, focussing on situations where a system integrator only has interface‐level visibility of the third‐party IP designs. Zhu et al.…”
Section: Related Studiesmentioning
confidence: 99%
“…A brief discussion of prevention techniques are provided without providing any specific solution. Siddiqui et al [7] and Tan et al [24] proposed two solutions for the implementation of distributed and decentralized systems aiming to detect anomalous conditions generated by hardware modules. While these solutions can help mitigating misbehaving conditions generated by the hardware module, they are not intended for the implementation of dynamic access control systems.…”
Section: B Pulp Soc Experimentsmentioning
confidence: 99%