Keynote address: Design of secure systems - Where are the EDA tools?

G. Sigl
{"title":"Keynote address: Design of secure systems - Where are the EDA tools?","authors":"G. Sigl","doi":"10.1109/ICCAD.2011.6105292","DOIUrl":null,"url":null,"abstract":"The design of security controllers, or more generally of microcontroller platforms implementing measures against hardware attacks, is still a very tedious handwork. Standardized and broadly available design tools as well as the necessary knowledge are rarely available and make secure hardware design a black art, known only within specialized companies building smart cards or Pay TV chips, for example. Secure hardware is, however, of increasing importance in many future embedded systems connected to cyber physical systems. Secure elements, i.e. special security chips or cores on a system on chip, are needed everywhere to protect these systems against physical attacks. Within this talk, the speaker will give some insight in the design flow of two security controller platforms and the special challenges encountered there. After summarizing the main attack scenarios for security hardware, a selection of countermeasures will be presented. These countermeasures have to be implemented and verified during various phases in the design flow. Some self-made tools and scripts have been used to achieve the result of a highly secure implementation, but there is a huge opportunity to accelerate implementation and verification steps. Furthermore, the knowledge about security could be captured inside tools and relieve designers of the task of becoming hardware security experts. The talk should motivate researchers in the EDA world to participate in the development of a new state-of-the-art design flow for secure hardware.","PeriodicalId":90518,"journal":{"name":"ICCAD. IEEE/ACM International Conference on Computer-Aided Design","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICCAD. IEEE/ACM International Conference on Computer-Aided Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAD.2011.6105292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The design of security controllers, or more generally of microcontroller platforms implementing measures against hardware attacks, is still a very tedious handwork. Standardized and broadly available design tools as well as the necessary knowledge are rarely available and make secure hardware design a black art, known only within specialized companies building smart cards or Pay TV chips, for example. Secure hardware is, however, of increasing importance in many future embedded systems connected to cyber physical systems. Secure elements, i.e. special security chips or cores on a system on chip, are needed everywhere to protect these systems against physical attacks. Within this talk, the speaker will give some insight in the design flow of two security controller platforms and the special challenges encountered there. After summarizing the main attack scenarios for security hardware, a selection of countermeasures will be presented. These countermeasures have to be implemented and verified during various phases in the design flow. Some self-made tools and scripts have been used to achieve the result of a highly secure implementation, but there is a huge opportunity to accelerate implementation and verification steps. Furthermore, the knowledge about security could be captured inside tools and relieve designers of the task of becoming hardware security experts. The talk should motivate researchers in the EDA world to participate in the development of a new state-of-the-art design flow for secure hardware.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
主题演讲:安全系统的设计——EDA工具在哪里?
安全控制器的设计,或者更一般的微控制器平台实施措施,以防止硬件攻击,仍然是一个非常繁琐的手工工作。标准化和广泛可用的设计工具以及必要的知识很少,这使得安全硬件设计成为一种黑色艺术,只有在制造智能卡或付费电视芯片的专业公司才知道。然而,安全硬件在连接到网络物理系统的许多未来嵌入式系统中变得越来越重要。到处都需要安全元素,即片上系统上的特殊安全芯片或核心,以保护这些系统免受物理攻击。在这次演讲中,演讲者将对两种安全控制器平台的设计流程以及在那里遇到的特殊挑战进行一些见解。在总结了安全硬件的主要攻击场景后,将提出一些对策。这些对策必须在设计流程的各个阶段实施和验证。已经使用了一些自制的工具和脚本来实现高度安全的实现,但是加速实现和验证步骤还有很大的机会。此外,有关安全的知识可以在工具中获取,从而减轻设计人员成为硬件安全专家的任务。这次演讲将激励EDA领域的研究人员参与到安全硬件的最新设计流程的开发中来。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Intelligent Real-time Human Activity Recognition Using Wi-Fi Signals A New H∞ Filter for a Nonlinear Singular System in the Time Domain Stability Analysis of an Anaerobic Wastewater Treatment Model Optimal sliding mode control for a pendulum system A new time domain functional observer design for bilinear system with constant time delay and unknown input
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1