Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Fundamentals of IP and SoC securityd...
~
Bhunia, Swarup.
Fundamentals of IP and SoC securitydesign, verification, and debug /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Fundamentals of IP and SoC securityedited by Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay.
Reminder of title:
design, verification, and debug /
other author:
Bhunia, Swarup.
Published:
Cham :Springer International Publishing :2017.
Description:
vi, 316 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
http://dx.doi.org/10.1007/978-3-319-50057-7
ISBN:
9783319500577$q(electronic bk.)
Fundamentals of IP and SoC securitydesign, verification, and debug /
Fundamentals of IP and SoC security
design, verification, and debug /[electronic resource] :edited by Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay. - Cham :Springer International Publishing :2017. - vi, 316 p. :ill., digital ;24 cm.
Introduction -- Security Validation -- SoC Security and Debug -- IP Trust: The Problem and Design/Validation based Solution -- Security of Crypto IP Core: Issues and Countermeasures -- PUF-Based Authentication -- FPGA-based IP and SoC Security -- Physical Unclonable Functions and Intellectual Property Protection Techniques -- A Systematic Approach to Fault-Attack Resistant Design -- Hardware Trojan Attacks and Countermeasures -- In-place Logic Obfuscation for Emerging Nonvolatile FPGAs -- Security Standards for Embedded Devices and Systems -- Conclusion.
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.
ISBN: 9783319500577$q(electronic bk.)
Standard No.: 10.1007/978-3-319-50057-7doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Fundamentals of IP and SoC securitydesign, verification, and debug /
LDR
:02613nmm a2200313 a 4500
001
506819
003
DE-He213
005
20170809173343.0
006
m d
007
cr nn 008maaau
008
171030s2017 gw s 0 eng d
020
$a
9783319500577$q(electronic bk.)
020
$a
9783319500553$q(paper)
024
7
$a
10.1007/978-3-319-50057-7
$2
doi
035
$a
978-3-319-50057-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
F981 2017
245
0 0
$a
Fundamentals of IP and SoC security
$h
[electronic resource] :
$b
design, verification, and debug /
$c
edited by Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
vi, 316 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Security Validation -- SoC Security and Debug -- IP Trust: The Problem and Design/Validation based Solution -- Security of Crypto IP Core: Issues and Countermeasures -- PUF-Based Authentication -- FPGA-based IP and SoC Security -- Physical Unclonable Functions and Intellectual Property Protection Techniques -- A Systematic Approach to Fault-Attack Resistant Design -- Hardware Trojan Attacks and Countermeasures -- In-place Logic Obfuscation for Emerging Nonvolatile FPGAs -- Security Standards for Embedded Devices and Systems -- Conclusion.
520
$a
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Internet
$x
Security measures.
$3
192260
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
650
2 4
$a
Electronic Circuits and Devices.
$3
495609
700
1
$a
Bhunia, Swarup.
$3
509777
700
1
$a
Ray, Sandip.
$3
485373
700
1
$a
Sur-Kolay, Susmita.
$3
773083
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-50057-7
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000137754
電子館藏
1圖書
電子書
EB QA76.9.A25 F981 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-50057-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login