Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

  title={Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA},
  author={J. Knechtel and E. Kavun and F. Regazzoni and Annelie Heuser and A. Chattopadhyay and D. Mukhopadhyay and Soumyajit Dey and Yunsi Fei and Y. Belenky and I. Levi and T. G{\"u}neysu and P. Schaumont and I. Polian},
  journal={2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
  • J. Knechtel, E. Kavun, +10 authors I. Polian
  • Published 2020
  • Computer Science
  • 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
Modern electronic systems become evermore complex, yet remain modular, with integrated circuits (ICs) acting as versatile hardware components at their heart. Electronic design automation (EDA) for ICs has focused traditionally on power, performance, and area. However, given the rise of hardware-centric security threats, we believe that EDA must also adopt related notions like secure by design and secure composition of hardware. Despite various promising studies, we argue that some aspects still… Expand
5 Citations

Figures and Tables from this paper

Towards Designing a Secure RISC-V System-on-Chip: ITUS
  • 1
Hardware Security For and Beyond CMOS Technology: An Overview on Fundamentals, Applications, and Challenges
  • 1
  • PDF
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
  • 1
  • PDF
Hardware Security for and beyond CMOS Technology


TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
  • 69
  • PDF
A digital design flow for secure integrated circuits
  • K. Tiri, I. Verbauwhede
  • Computer Science
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • 2006
  • 141
  • PDF
Protect Your Chip Design Intellectual Property: An Overview
  • 9
  • PDF
EPIC: Ending Piracy of Integrated Circuits
  • 441
  • PDF
Security is an Architectural Design Constraint
  • 2
  • Highly Influential
  • PDF
Caisson: a hardware description language for secure information flow
  • 88
  • PDF
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
  • 5
  • PDF
Security Assurance for System-on-Chip Designs With Untrusted IPs
  • 28
  • PDF
BISA: Built-in self-authentication for preventing hardware Trojan insertion
  • K. Xiao, M. Tehranipoor
  • Engineering, Computer Science
  • 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
  • 2013
  • 93
Security-oriented Code-based Architectures for Mitigating Fault Attacks
  • 5