Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/581199.581242acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
Article

Special session: security on SoC

Published: 02 October 2002 Publication History

Abstract

SoC is one of the important components of social and personal information systems, which directly influence with our life, property and privacy. Security technology is now embedded into various hardware and software of SoC and SoC designers should be concerned with security issues. Cryptography requires heavy computation and wireless communication requests architecture and protocols for security. In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC. In this panel, we will have discussions on the security on SoC from various viewpoints. System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure systesynthesis.

References

[1]
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", LNCS 1666, 1999.]]
[2]
A. Stubblefield, J. Ioannidis, A.Rubin "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP", AT&T Lab, Tech.Rept TD-4ZCPZZ, August 2001.]]
[3]
A. Menezes, et al. "PGP in constrained wireless devices" Proc of 9th USENIX Sec. Symp. 2000.]]
[4]
C. Gebotys, R. Gebotys, Secure Elliptic Curve Implementations: An analysis of resistance to power-attacks in a DSP processor, to appear CHES' 02, LNCS 2002.]]
[5]
M. Torla, "Testing and Validation of MPC190" in this proceeding.]]

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ISSS '02: Proceedings of the 15th international symposium on System Synthesis
October 2002
278 pages
ISBN:1581135769
DOI:10.1145/581199
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ISSS02
Sponsor:

Acceptance Rates

ISSS '02 Paper Acceptance Rate 38 of 71 submissions, 54%;
Overall Acceptance Rate 38 of 71 submissions, 54%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 340
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media