Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Network-on-chip security and privacy
~
Charles, Subodha.
Network-on-chip security and privacy
Record Type:
Electronic resources : Monograph/item
Title/Author:
Network-on-chip security and privacyedited by Prabhat Mishra, Subodha Charles.
other author:
Mishra, Prabhat.
Published:
Cham :Springer International Publishing :2021.
Description:
xii, 496 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Networks on a chipSecurity measures.
Online resource:
https://doi.org/10.1007/978-3-030-69131-8
ISBN:
9783030691318$q(electronic bk.)
Network-on-chip security and privacy
Network-on-chip security and privacy
[electronic resource] /edited by Prabhat Mishra, Subodha Charles. - Cham :Springer International Publishing :2021. - xii, 496 p. :ill., digital ;24 cm.
Introduction to System-on-Chip Design using Network-on-Chip -- Network-on-Chip Security Challenges due to Supply Chain -- Characterizing and Optimizing Performance in NoC Architectures -- Characterizing and Optimizing Energy in NoC Architectures -- Modeling NoC in Architectural Simulators -- Eavesdropping Attacks -- Data Integrity Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks -- Emerging Security Vulnerabilities in NoC-based SoCs -- Lightweight Encryption and authentication in NoC-based SoCs -- Trust-aware Routing in NoC-based SoCs -- Route and Data Randomization in NoC-based SoCs -- Mitigating Side-Channel Attacks in NoC-based SoCs -- Real-time Detection and Localization of DoS attacks -- Digital Watermarking for Detecting Malicious IP Cores -- Authorization for NoC Resource Accesses -- Formal Verification of NoC Security Properties -- NoC Trust Verification using Security Assertions -- Securing Optical/Photonic NoC -- Securing Wireless NoC -- Securing 2.5 and 3D NoC -- Future of Trustworthy On-Chip Communication -- Conclusions and Future Directions.
This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems. Provides a comprehensive overview of NoC security vulnerabilities for diverse on-chip communication architectures, including bus, mesh, ring, star, and hybrid network topologies; Describes state-of-the-art security solutions for defending against a wide spectrum of attacks, including malicious implants (e.g., hardware Trojans), eavesdropping, information leakage, spoofing, denial-of-service, and erroneous execution; Covers a wide variety of NoC attacks and effective countermeasures for diverse communication technologies, including electrical, optical (photonic) and wireless NoCs; Presents lightweight static (design-for-trust), as well as dynamic (runtime) security solutions; Enables security validation using an effective combination of formal methods, assertion-based validation, side-channel analysis, and machine learning; Discusses trade-offs between on-chip communication security and energy-efficient implementation in resource constrained embedded systems and IoT devices.
ISBN: 9783030691318$q(electronic bk.)
Standard No.: 10.1007/978-3-030-69131-8doiSubjects--Topical Terms:
891282
Networks on a chip
--Security measures.
LC Class. No.: TK5105.546 / .N489 2021
Dewey Class. No.: 006.22
Network-on-chip security and privacy
LDR
:03489nmm a2200325 a 4500
001
597842
003
DE-He213
005
20210728112354.0
006
m d
007
cr nn 008maaau
008
211019s2021 sz s 0 eng d
020
$a
9783030691318$q(electronic bk.)
020
$a
9783030691301$q(paper)
024
7
$a
10.1007/978-3-030-69131-8
$2
doi
035
$a
978-3-030-69131-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.546
$b
.N489 2021
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
006.22
$2
23
090
$a
TK5105.546
$b
.N476 2021
245
0 0
$a
Network-on-chip security and privacy
$h
[electronic resource] /
$c
edited by Prabhat Mishra, Subodha Charles.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 496 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction to System-on-Chip Design using Network-on-Chip -- Network-on-Chip Security Challenges due to Supply Chain -- Characterizing and Optimizing Performance in NoC Architectures -- Characterizing and Optimizing Energy in NoC Architectures -- Modeling NoC in Architectural Simulators -- Eavesdropping Attacks -- Data Integrity Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks -- Emerging Security Vulnerabilities in NoC-based SoCs -- Lightweight Encryption and authentication in NoC-based SoCs -- Trust-aware Routing in NoC-based SoCs -- Route and Data Randomization in NoC-based SoCs -- Mitigating Side-Channel Attacks in NoC-based SoCs -- Real-time Detection and Localization of DoS attacks -- Digital Watermarking for Detecting Malicious IP Cores -- Authorization for NoC Resource Accesses -- Formal Verification of NoC Security Properties -- NoC Trust Verification using Security Assertions -- Securing Optical/Photonic NoC -- Securing Wireless NoC -- Securing 2.5 and 3D NoC -- Future of Trustworthy On-Chip Communication -- Conclusions and Future Directions.
520
$a
This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems. Provides a comprehensive overview of NoC security vulnerabilities for diverse on-chip communication architectures, including bus, mesh, ring, star, and hybrid network topologies; Describes state-of-the-art security solutions for defending against a wide spectrum of attacks, including malicious implants (e.g., hardware Trojans), eavesdropping, information leakage, spoofing, denial-of-service, and erroneous execution; Covers a wide variety of NoC attacks and effective countermeasures for diverse communication technologies, including electrical, optical (photonic) and wireless NoCs; Presents lightweight static (design-for-trust), as well as dynamic (runtime) security solutions; Enables security validation using an effective combination of formal methods, assertion-based validation, side-channel analysis, and machine learning; Discusses trade-offs between on-chip communication security and energy-efficient implementation in resource constrained embedded systems and IoT devices.
650
0
$a
Networks on a chip
$x
Security measures.
$3
891282
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
700
1
$a
Mishra, Prabhat.
$3
253937
700
1
$a
Charles, Subodha.
$3
891281
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-69131-8
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000196572
電子館藏
1圖書
電子書
EB TK5105.546 .N476 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-69131-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login