Sept. 28, 2022, 1:20 a.m. | Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda

cs.CR updates on arXiv.org arxiv.org

Secure and trustworthy execution in heterogeneous SoCs is a major priority in
the modern computing system. Security of SoCs mainly addresses two broad layers
of trust issues: 1. Protection against hardware security threats(Side-channel,
IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection
against malicious software attacks running on SoC processors. To resist
malicious software-level attackers from gaining unauthorized access and
compromising security, we propose a root of trust-based trusted execution
mechanism \textbf{\textit{(named as \textbf{TrustToken}) }}. TrustToken builds …

intellectual property intellectual property (ip) non soc solution

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India