Efficient Techniques For Soc Security Validation And Monitoring