Abstract
It has been almost a decade since the number of smart, connected computing devices has exceeded the human population, ushering in the regime of the Internet of thingsĀ [1]. Today, we live in an environment containing tens of billions of computing devices of diverse variety and form factors, performing a range of applications often including some of our most private and intimate data. These devices include smartphones, tablets, consumer items (e.g., refrigerators, light bulbs, and thermostats), wearables, etc. The trend is toward this proliferation to increase exponentially in the coming decades, with estimates going to trillions of devices as early as by 2030, signifying the fastest growth by a large measure across any sector in the history of the human civilization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Evans, D.: The Internet of ThingsāHow the Next Evolution of the Internet is Changing Everything. White Paper, Cisco Internet Business Solutions Group (IBSG) (2011)
Li, X., Oberg, J.V.K., Tiwari, M., Rajarathinam, V., Kastner, R., Sherwood, T., Hardekopf, B., Chong, F.T.: Sapper: a language for hardware-level security policy enforcement. In: International Conference on Architectural Support for Programming Languages and Operating Systems (2014)
Srivatanakul, J., Clark, J.A., Polac, F.: Effective security requirements analysis: HAZOPs and use cases. In: \(7\)th International Conference on Information Security, pp. 416ā427 (2004)
ARM: Building a secure system using trustzone technology. ARM Limited (2009)
Basak, A., Bhunia, S., Ray, S.: A flexible architecture for systematic implementation of SoC security policies. In: Proceedings of the 34th International Conference on Computer-Aided Design (2015)
Intel: Intel\({\textregistered }\) Software Guard Extensions Programming Reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf
Samsung: Samsung KNOX. www.samsungknox.com
Microsoft Threat Modeling & Analysis Tool version 3.0 (2009)
JasperGold Security Path verification App. https://www.cadence.com/tools/system-design-and-verification/formal-and-static-verification/jasper-gold-verification-platform/security-path-verification-app.html
Bazhaniuk, O., Loucaides, J., Rosenbaum, L., Tuttle, M.R., Zimmer, V.: Excite: symbolic execution for BIOS security. In: Workshop on Offensive Technologies (2015)
Kannavara, R., Havlicek, C.J., Chen, B., Tuttle, M.R., Cong, K., Ray, S., Xie, F.: Challenges and opportunities with concolic testing. In: NAECON 2015 (2015)
Takanen, A., DeMott, J.D., Mille, C.: Fuzzing for software security testing and quality assurance. Artech House (2008)
Ray, S., Hoque, T., Basak, A., Bhunia, S.: The power play: trade-offs between energy and security in IoT. In: ICCD (2016)
Ray, S., Yang, J., Basak, A., Bhunia, S.: Correctness and security at odds: post-silicon validation of modern SoC designs. In: Proceedings of the 52nd Annual Design Automation Conference (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Ray, S., Sur-Kolay, S., Bhunia, S. (2017). The Landscape of SoC and IP Security. In: Bhunia, S., Ray, S., Sur-Kolay, S. (eds) Fundamentals of IP and SoC Security. Springer, Cham. https://doi.org/10.1007/978-3-319-50057-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-50057-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50055-3
Online ISBN: 978-3-319-50057-7
eBook Packages: EngineeringEngineering (R0)