Hardware IP Security and Trust [electronic resource] / edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor.
Вид матеріалу:
Текст Публікація: Cham : Springer International Publishing : Imprint: Springer, 2017Видання: 1st ed. 2017Опис: XII, 353 p. 131 illus., 78 illus. in color. online resourceТип вмісту: - text
- computer
- online resource
- 9783319490250
- 621.3815 23
- TK7888.4
ЕКнига
Списки з цим бібзаписом:
Springer Ebooks (till 2020 - Open Access)+(2017 Network Access))
|
Springer Ebooks (2017 Network Access))
Part I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
Available to subscribing member institutions only. Доступно лише організаціям членам підписки.
Online access from local network of NaUOA.
Online access with authorization at https://link.springer.com/
Онлайн-доступ з локальної мережі НаУОА.
Онлайн доступ з авторизацією на https://link.springer.com/
Немає коментарів для цієї одиниці.