000 03659nam a22005295i 4500
001 978-3-319-50057-7
003 DE-He213
005 20220801221933.0
007 cr nn 008mamaa
008 170124s2017 sz | s |||| 0|eng d
020 _a9783319500577
_9978-3-319-50057-7
024 7 _a10.1007/978-3-319-50057-7
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aFundamentals of IP and SoC Security
_h[electronic resource] :
_bDesign, Verification, and Debug /
_cedited by Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aVI, 316 p. 105 illus., 52 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Security Validation -- SoC Security and Debug -- IP Trust: The Problem and Design/Validation based Solution -- Security of Crypto IP Core: Issues and Countermeasures -- PUF-Based Authentication -- FPGA-based IP and SoC Security -- Physical Unclonable Functions and Intellectual Property Protection Techniques -- A Systematic Approach to Fault-Attack Resistant Design -- Hardware Trojan Attacks and Countermeasures -- In-place Logic Obfuscation for Emerging Nonvolatile FPGAs -- Security Standards for Embedded Devices and Systems -- Conclusion.
520 _aThis book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs;  Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.  .
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_958806
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_958807
650 2 4 _aProcessor Architectures.
_958808
700 1 _aBhunia, Swarup.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_958809
700 1 _aRay, Sandip.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_958810
700 1 _aSur-Kolay, Susmita.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_958811
710 2 _aSpringerLink (Online service)
_958812
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319500553
776 0 8 _iPrinted edition:
_z9783319500560
776 0 8 _iPrinted edition:
_z9783319843087
856 4 0 _uhttps://doi.org/10.1007/978-3-319-50057-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80221
_d80221