| 000 | 04899nam a22006495i 4500 | ||
|---|---|---|---|
| 001 | 978-3-319-49025-0 | ||
| 003 | DE-He213 | ||
| 005 | 20210118122228.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 170102s2017 gw | s |||| 0|eng d | ||
| 020 |
_a9783319490250 _9978-3-319-49025-0 |
||
| 024 | 7 |
_a10.1007/978-3-319-49025-0 _2doi |
|
| 050 | 4 | _aTK7888.4 | |
| 072 | 7 |
_aTJFC _2bicssc |
|
| 072 | 7 |
_aTEC008010 _2bisacsh |
|
| 072 | 7 |
_aTJFC _2thema |
|
| 082 | 0 | 4 |
_a621.3815 _223 |
| 245 | 1 | 0 |
_aHardware IP Security and Trust _h[electronic resource] / _cedited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor. |
| 250 | _a1st ed. 2017. | ||
| 264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
| 300 |
_aXII, 353 p. 131 illus., 78 illus. in color. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aPart I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design. | |
| 520 | _aThis book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs. | ||
| 650 | 0 | _aElectronic circuits. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aElectronics. | |
| 650 | 0 | _aMicroelectronics. | |
| 650 | 0 | _aMicroprocessors. | |
| 650 | 1 | 4 |
_aCircuits and Systems. _0http://scigraph.springernature.com/things/product-market-codes/T24068 |
| 650 | 2 | 4 |
_aCryptology. _0http://scigraph.springernature.com/things/product-market-codes/I28020 |
| 650 | 2 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
| 650 | 2 | 4 |
_aElectronics and Microelectronics, Instrumentation. _0http://scigraph.springernature.com/things/product-market-codes/T24027 |
| 650 | 2 | 4 |
_aProcessor Architectures. _0http://scigraph.springernature.com/things/product-market-codes/I13014 |
| 700 | 1 |
_aMishra, Prabhat. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
| 700 | 1 |
_aBhunia, Swarup. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
| 700 | 1 |
_aTehranipoor, Mark. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783319490243 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783319490267 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783319840703 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-49025-0 |
| 912 | _aZDB-2-ENG | ||
| 999 |
_c445546 _d445546 |
||
| 942 | _cEB | ||
| 506 | _aAvailable to subscribing member institutions only. Доступно лише організаціям членам підписки. | ||
| 506 | _fOnline access from local network of NaUOA. | ||
| 506 | _fOnline access with authorization at https://link.springer.com/ | ||
| 506 | _fОнлайн-доступ з локальної мережі НаУОА. | ||
| 506 | _fОнлайн доступ з авторизацією на https://link.springer.com/ | ||