語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Behavioral Synthesis for Hardware Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Behavioral Synthesis for Hardware Security/ edited by Srinivas Katkoori, Sheikh Ariful Islam.
其他作者:
Islam, Sheikh Ariful.
面頁冊數:
XV, 398 p. 154 illus., 118 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Processor Architectures. -
電子資源:
https://doi.org/10.1007/978-3-030-78841-4
ISBN:
9783030788414
Behavioral Synthesis for Hardware Security
Behavioral Synthesis for Hardware Security
[electronic resource] /edited by Srinivas Katkoori, Sheikh Ariful Islam. - 1st ed. 2022. - XV, 398 p. 154 illus., 118 illus. in color.online resource.
Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.
ISBN: 9783030788414
Standard No.: 10.1007/978-3-030-78841-4doiSubjects--Topical Terms:
669787
Processor Architectures.
LC Class. No.: TK7867-7867.5
Dewey Class. No.: 621.3815
Behavioral Synthesis for Hardware Security
LDR
:03362nam a22003975i 4500
001
1094055
003
DE-He213
005
20220208133944.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030788414
$9
978-3-030-78841-4
024
7
$a
10.1007/978-3-030-78841-4
$2
doi
035
$a
978-3-030-78841-4
050
4
$a
TK7867-7867.5
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
245
1 0
$a
Behavioral Synthesis for Hardware Security
$h
[electronic resource] /
$c
edited by Srinivas Katkoori, Sheikh Ariful Islam.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XV, 398 p. 154 illus., 118 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.
520
$a
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
1 4
$a
Electronic Circuits and Systems.
$3
1366689
650
0
$a
Computer architecture.
$3
528145
650
0
$a
Microprocessors.
$3
632481
650
0
$a
Cooperating objects (Computer systems).
$3
1387590
650
0
$a
Electronic circuits.
$3
563332
700
1
$a
Islam, Sheikh Ariful.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1402115
700
1
$a
Katkoori, Srinivas.
$e
editor.
$1
https://orcid.org/0000-0002-7589-5836
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1318812
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030788407
776
0 8
$i
Printed edition:
$z
9783030788421
776
0 8
$i
Printed edition:
$z
9783030788438
856
4 0
$u
https://doi.org/10.1007/978-3-030-78841-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入