000 04899nam a22006495i 4500
001 978-3-319-49025-0
003 DE-He213
005 20210118122228.0
007 cr nn 008mamaa
008 170102s2017 gw | s |||| 0|eng d
020 _a9783319490250
_9978-3-319-49025-0
024 7 _a10.1007/978-3-319-49025-0
_2doi
050 4 _aTK7888.4
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aHardware IP Security and Trust
_h[electronic resource] /
_cedited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXII, 353 p. 131 illus., 78 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPart I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design.
520 _aThis book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
650 0 _aElectronic circuits.
650 0 _aData encryption (Computer science).
650 0 _aComputer security.
650 0 _aElectronics.
650 0 _aMicroelectronics.
650 0 _aMicroprocessors.
650 1 4 _aCircuits and Systems.
_0http://scigraph.springernature.com/things/product-market-codes/T24068
650 2 4 _aCryptology.
_0http://scigraph.springernature.com/things/product-market-codes/I28020
650 2 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aElectronics and Microelectronics, Instrumentation.
_0http://scigraph.springernature.com/things/product-market-codes/T24027
650 2 4 _aProcessor Architectures.
_0http://scigraph.springernature.com/things/product-market-codes/I13014
700 1 _aMishra, Prabhat.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBhunia, Swarup.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTehranipoor, Mark.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319490243
776 0 8 _iPrinted edition:
_z9783319490267
776 0 8 _iPrinted edition:
_z9783319840703
856 4 0 _uhttps://doi.org/10.1007/978-3-319-49025-0
912 _aZDB-2-ENG
999 _c445546
_d445546
942 _cEB
506 _aAvailable to subscribing member institutions only. Доступно лише організаціям членам підписки.
506 _fOnline access from local network of NaUOA.
506 _fOnline access with authorization at https://link.springer.com/
506 _fОнлайн-доступ з локальної мережі НаУОА.
506 _fОнлайн доступ з авторизацією на https://link.springer.com/