語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject:"Cyber-Physical Systems." ]
切換:
標籤
|
MARC模式
|
ISBD
Behavioral synthesis for hardware se...
~
Katkoori, Srinivas.
FindBook
Google Book
Amazon
博客來
Behavioral synthesis for hardware security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Behavioral synthesis for hardware security/ edited by Srinivas Katkoori, Sheikh Ariful Islam.
其他作者:
Katkoori, Srinivas.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xv, 398 p. :ill., digital ;24 cm.
內容註:
Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.
Contained By:
Springer Nature eBook
標題:
Integrated circuits - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-78841-4
ISBN:
9783030788414
Behavioral synthesis for hardware security
Behavioral synthesis for hardware security
[electronic resource] /edited by Srinivas Katkoori, Sheikh Ariful Islam. - Cham :Springer International Publishing :2022. - xv, 398 p. :ill., digital ;24 cm.
Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.
ISBN: 9783030788414
Standard No.: 10.1007/978-3-030-78841-4doiSubjects--Topical Terms:
3308545
Integrated circuits
--Security measures.
LC Class. No.: TK7874 / .B44 2022
Dewey Class. No.: 621.3815
Behavioral synthesis for hardware security
LDR
:02984nmm a2200325 a 4500
001
2298254
003
DE-He213
005
20220208133944.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030788414
$q
(electronic bk.)
020
$a
9783030788407
$q
(paper)
024
7
$a
10.1007/978-3-030-78841-4
$2
doi
035
$a
978-3-030-78841-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7874
$b
.B44 2022
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
090
$a
TK7874
$b
.B419 2022
245
0 0
$a
Behavioral synthesis for hardware security
$h
[electronic resource] /
$c
edited by Srinivas Katkoori, Sheikh Ariful Islam.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xv, 398 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.
520
$a
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.
650
0
$a
Integrated circuits
$x
Security measures.
$3
3308545
650
1 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Processor Architectures.
$3
892680
700
1
$a
Katkoori, Srinivas.
$3
3594551
700
1
$a
Islam, Sheikh Ariful.
$3
3594552
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-78841-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9440146
電子資源
11.線上閱覽_V
電子書
EB TK7874 .B44 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入