TrustToken, Trusted SoC solution for Non-Trusted Intellectual Property (IP)s.
TimeTuesday, July 12th6pm - 7pm PDT
LocationLevel 2 Lobby
DescriptionA malicious attackers could often alter the IP design
at any stage of the IC supply chain and compromise SoC security.
This paper propose root of trust-based secure mechanism (named
as TrustToken) to provide SoC security from malicious nontrusted third party IPs. TrustToken only allows authenticated
communication between the non-trusted third-party IP and SoC.
The proposed design achieves this by interconnecting the thirdparty IP interface to TrustToken Controller and checking IP
authorization(Token) signals ”correctness” at run-time. TrustToken architecture shows a very low overhead resource utilization
LUT (618, 1.16 %), FF (44, 0.04 %), and BUFG (2 , 6.25%) in