Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine Learning for Embedded System Security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Machine Learning for Embedded System Security/ edited by Basel Halak.
other author:
Halak, Basel.
Description:
XV, 160 p. 66 illus., 39 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Embedded computer systems. -
Online resource:
https://doi.org/10.1007/978-3-030-94178-9
ISBN:
9783030941789
Machine Learning for Embedded System Security
Machine Learning for Embedded System Security
[electronic resource] /edited by Basel Halak. - 1st ed. 2022. - XV, 160 p. 66 illus., 39 illus. in color.online resource.
Introduction -- Machine Learning for Tamper Detection -- Machine Learning for IC Counterfeit Detection and Prevention -- Machine Learning for Secure PUF Design -- Machine Learning for Malware Analysis -- Machine Learning for Detection of Software Attacks -- Conclusions and Future Opportunities. .
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning; Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans; Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs); It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems. .
ISBN: 9783030941789
Standard No.: 10.1007/978-3-030-94178-9doiSubjects--Topical Terms:
562313
Embedded computer systems.
LC Class. No.: TK7895.E42
Dewey Class. No.: 006.22
Machine Learning for Embedded System Security
LDR
:02941nam a22003975i 4500
001
1093084
003
DE-He213
005
20220422130105.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030941789
$9
978-3-030-94178-9
024
7
$a
10.1007/978-3-030-94178-9
$2
doi
035
$a
978-3-030-94178-9
050
4
$a
TK7895.E42
072
7
$a
UKM
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
UKM
$2
thema
082
0 4
$a
006.22
$2
23
245
1 0
$a
Machine Learning for Embedded System Security
$h
[electronic resource] /
$c
edited by Basel Halak.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XV, 160 p. 66 illus., 39 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Machine Learning for Tamper Detection -- Machine Learning for IC Counterfeit Detection and Prevention -- Machine Learning for Secure PUF Design -- Machine Learning for Malware Analysis -- Machine Learning for Detection of Software Attacks -- Conclusions and Future Opportunities. .
520
$a
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning; Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans; Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs); It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems. .
650
0
$a
Embedded computer systems.
$3
562313
650
0
$a
Electronic circuit design.
$3
596419
650
0
$a
Microprocessors.
$3
632481
650
0
$a
Computer architecture.
$3
528145
650
1 4
$a
Embedded Systems.
$3
1026431
650
2 4
$a
Electronics Design and Verification.
$3
1387809
650
2 4
$a
Processor Architectures.
$3
669787
700
1
$a
Halak, Basel.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1203733
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030941772
776
0 8
$i
Printed edition:
$z
9783030941796
776
0 8
$i
Printed edition:
$z
9783030941802
856
4 0
$u
https://doi.org/10.1007/978-3-030-94178-9
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login