Abstract

Growing reliance on reusable hardware IPs, often gathered from untrusted third party vendors, severely affects the security and trustworthiness of SoC computing platforms. This book presented a wide variety of IP models, their security vulnerabilities, and potential countermeasures in the form of IP security and trust validation to enable reliable and trustworthy SoC design. This chapter concludes the book with a summary of ideas presented in the previous chapters, and outlines the future road map of trustworthy and secure SoC design.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call