Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security policy in system-on-chip de...
~
Basak, Abhishek.
Security policy in system-on-chip designsspecification, implementation and verification /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security policy in system-on-chip designsby Sandip Ray, Abhishek Basak, Swarup Bhunia.
Reminder of title:
specification, implementation and verification /
Author:
Ray, Sandip.
other author:
Basak, Abhishek.
Published:
Cham :Springer International Publishing :2019.
Description:
ix, 116 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Systems on a chipSecurity measures.
Online resource:
https://doi.org/10.1007/978-3-319-93464-8
ISBN:
9783319934648$q(electronic bk.)
Security policy in system-on-chip designsspecification, implementation and verification /
Ray, Sandip.
Security policy in system-on-chip designs
specification, implementation and verification /[electronic resource] :by Sandip Ray, Abhishek Basak, Swarup Bhunia. - Cham :Springer International Publishing :2019. - ix, 116 p. :ill., digital ;24 cm.
Chapter1: SoC Security Policies: The State of the Practice -- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture -- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture -- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks -- Chapter5: A Move Towards a Hardware Patch -- Chapter6: SoC Security Policy Verification -- Chapter7: SoC Security Policies: Summary and Future Directions.
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.
ISBN: 9783319934648$q(electronic bk.)
Standard No.: 10.1007/978-3-319-93464-8doiSubjects--Topical Terms:
834369
Systems on a chip
--Security measures.
LC Class. No.: TK7895.E42 / R397 2019
Dewey Class. No.: 006.22
Security policy in system-on-chip designsspecification, implementation and verification /
LDR
:03116nmm a2200325 a 4500
001
553203
003
DE-He213
005
20190530140122.0
006
m d
007
cr nn 008maaau
008
191111s2019 gw s 0 eng d
020
$a
9783319934648$q(electronic bk.)
020
$a
9783319934631$q(paper)
024
7
$a
10.1007/978-3-319-93464-8
$2
doi
035
$a
978-3-319-93464-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7895.E42
$b
R397 2019
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
006.22
$2
23
090
$a
TK7895.E42
$b
R264 2019
100
1
$a
Ray, Sandip.
$3
485373
245
1 0
$a
Security policy in system-on-chip designs
$h
[electronic resource] :
$b
specification, implementation and verification /
$c
by Sandip Ray, Abhishek Basak, Swarup Bhunia.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
ix, 116 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter1: SoC Security Policies: The State of the Practice -- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture -- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture -- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks -- Chapter5: A Move Towards a Hardware Patch -- Chapter6: SoC Security Policy Verification -- Chapter7: SoC Security Policies: Summary and Future Directions.
520
$a
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.
650
0
$a
Systems on a chip
$x
Security measures.
$3
834369
650
0
$a
Systems on a chip
$x
Design.
$3
456731
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
650
2 4
$a
Electronics and Microelectronics, Instrumentation.
$3
274412
700
1
$a
Basak, Abhishek.
$3
834368
700
1
$a
Bhunia, Swarup.
$3
509777
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-319-93464-8
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000166319
電子館藏
1圖書
電子書
EB TK7895.E42 R264 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-319-93464-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login