|
|
|
|
LEADER |
03298nmm a2200409 u 4500 |
001 |
EB001345596 |
003 |
EBX01000000000000000899786 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
170203 ||| eng |
020 |
|
|
|a 9783319490250
|
100 |
1 |
|
|a Mishra, Prabhat
|e [editor]
|
245 |
0 |
0 |
|a Hardware IP Security and Trust
|h Elektronische Ressource
|c edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
|
250 |
|
|
|a 1st ed. 2017
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2017, 2017
|
300 |
|
|
|a XII, 353 p. 131 illus., 78 illus. in color
|b online resource
|
505 |
0 |
|
|a Part I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design
|
653 |
|
|
|a Electronics and Microelectronics, Instrumentation
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic circuits
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Processor Architectures
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Microprocessors
|
653 |
|
|
|a Electronics
|
653 |
|
|
|a Electronic Circuits and Systems
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computer architecture
|
700 |
1 |
|
|a Bhunia, Swarup
|e [editor]
|
700 |
1 |
|
|a Tehranipoor, Mark
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
028 |
5 |
0 |
|a 10.1007/978-3-319-49025-0
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-49025-0?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 621.3815
|
520 |
|
|
|a This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs
|