2020 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2020
DOI: 10.23919/date48585.2020.9116483
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 49 publications
0
8
0
Order By: Relevance
“…Replicating these abstracted flows for SCA security verification is strongly discouraged, though very attractive. Physical design characteristics such as the ones that need to be evaluated for hardware security are not fully covered by digital views to date [4]. Even if some parameters are characterized, e.g., standard cells current models, they are not specifically tailored to reflect security-related sensitivities nor are provided with the required resolution.…”
Section: Motivation: the Cost Of Being Lazy Or Non-exhaustivementioning
confidence: 99%
“…Replicating these abstracted flows for SCA security verification is strongly discouraged, though very attractive. Physical design characteristics such as the ones that need to be evaluated for hardware security are not fully covered by digital views to date [4]. Even if some parameters are characterized, e.g., standard cells current models, they are not specifically tailored to reflect security-related sensitivities nor are provided with the required resolution.…”
Section: Motivation: the Cost Of Being Lazy Or Non-exhaustivementioning
confidence: 99%
“…This motivates a security-aware design flow starting from the choice of security primitives, protocols and architecture. Knechtel et al [22] provide a comprehensive analysis about the role of EDA on hardware security. They identify the challenges yet to be resolved in effective compilation of security assumptions and constraints across different levels of abstraction, modeling and evaluation of hardware security metrics and holistic synthesis of security countermeasures without causing side-effects.…”
Section: B Security Driven Hardware Design Toolsmentioning
confidence: 99%
“…Proactive hardware information flow analyses facilitate vulnerability shielding and on-site monitoring. For example, unintentional hardware flaws and potential security vulnerabilities can be detected early by the recent security-driven hardware design flow [20]- [22]. As the rally of attacks and countermeasures is a neverending recursion, it is important to keep abreast of its latest development to continuously close the productivity gap of secure hardware design.…”
Section: Introductionmentioning
confidence: 99%
“…Still, without any further efforts, the scale and persuasiveness of such obfuscations are subject alone to the synthesis tool, whose objectives and metrics are not focused toward security. These and other risks incurred by design tools during the implementation of secure schemes have been acknowledged, e.g., see [8], [9]. Fig.…”
Section: Key-gatementioning
confidence: 99%