Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
|
Buy Now
Principles of Secure Processor Architecture Design (Paperback)
Loot Price: R1,788
Discovery Miles 17 880
|
|
Principles of Secure Processor Architecture Design (Paperback)
Series: Synthesis Lectures on Computer Architecture
Expected to ship within 10 - 15 working days
|
With growing interest in computer security and the protection of
the code and data which execute on commodity computers, the amount
of hardware security features in today's processors has increased
significantly over the recent years. No longer of just academic
interest, security features inside processors have been embraced by
industry as well, with a number of commercial secure processor
architectures available today. This book aims to give readers
insights into the principles behind the design of academic and
commercial secure processor architectures. Secure processor
architecture research is concerned with exploring and designing
hardware features inside computer processors, features which can
help protect confidentiality and integrity of the code and data
executing on the processor. Unlike traditional processor
architecture research that focuses on performance, efficiency, and
energy as the first-order design objectives, secure processor
architecture design has security as the first-order design
objective (while still keeping the others as important design
aspects that need to be considered). This book aims to present the
different challenges of secure processor architecture design to
graduate students interested in research on architecture and
hardware security and computer architects working in industry
interested in adding security features to their designs. It aims to
educate readers about how the different challenges have been solved
in the past and what are the best practices, i.e., the principles,
for design of new secure processor architectures. Based on the
careful review of past work by many computer architects and
security researchers, readers also will come to know the five basic
principles needed for secure processor architecture design. The
book also presents existing research challenges and potential new
research directions. Finally, this book presents numerous design
suggestions, as well as discusses pitfalls and fallacies that
designers should avoid.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.