DAC-Security Track 2015 Design Automation Conference

Date: Jun 07, 2015 – Jun 11, 2015
Location: San Francisco, Ca.

Security primitives and protocols are typically built upon the notion of a “secret” key or code stored in a protected place. A common presumption in software, data, and systems security is that as long as the secret is in the hardware, their method is invulnerable to attacks and exploits.  However this is not true.

These systems are vulnerable to a variety of hardware-centric attacks: side channel analysis, reverse engineering, IP piracy, hardware Trojans and counterfeiting.  Furthermore, a host of hardware-based threats are emerging due to the globalization of Integrated Circuit (IC) and embedded system design. Consequently, designers and users of ICs, Intellectual Property (IP) and embedded systems are beginning to re-assess their trust in these systems. Also, hardware acceleration of security solutions is an emerging trend; it has shown a great promise to improve efficiency and cost of designing secure systems. Overall, there is an urgent need to create, analyze, evaluate, and improve the hardware base of the contemporary security solutions. The Security Track at DAC seeks to highlight and celebrate the emergence of security and trust as an important dimension of Hardware and Embedded Systems Design (side-by-side with power, performance, and reliability).

 

Submitted by Brandon Ball on