|
Showing 1 - 11 of
11 matches in All Departments
This book provides comprehensive coverage of state-of-the-art
integrated circuit authentication techniques, including
technologies, protocols and emerging applications. The authors
first discuss emerging solutions for embedding unforgeable
identifies into electronics devices, using techniques such as IC
fingerprinting, physically unclonable functions and
voltage-over-scaling. Coverage then turns to authentications
protocols, with a special focus on resource-constrained devices,
first giving an overview of the limitation of existing solutions
and then presenting a number of new protocols, which provide better
physical security and lower energy dissipation. The third part of
the book focuses on emerging security applications for
authentication schemes, including securing hardware supply chains,
hardware-based device attestation and GPS spoofing attack detection
and survival. Provides deep insight into the security threats
undermining existing integrated circuit authentication techniques;
Includes an in-depth discussion of the emerging technologies used
to embed unforgeable identifies into electronics systems; Offers a
comprehensive summary of existing authentication protocols and
their limitations; Describes state-of-the-art authentication
protocols that provide better physical security and more efficient
energy consumption; Includes detailed case studies on the emerging
applications of IC authentication schemes.
This book provides comprehensive coverage of the latest research
into integrated circuits' ageing, explaining the causes of this
phenomenon, describing its effects on electronic systems, and
providing mitigation techniques to build ageing-resilient circuits.
This book presents a new threat modelling approach that
specifically targets the hardware supply chain, covering security
risks throughout the lifecycle of an electronic system. The authors
present a case study on a new type of security attack, which
combines two forms of attack mechanisms from two different stages
of the IC supply chain. More specifically, this attack targets the
newly developed, light cipher (Ascon) and demonstrates how it can
be broken easily, when its implementation is compromised with a
hardware Trojan. This book also discusses emerging countermeasures,
including anti-counterfeit design techniques for resources
constrained devices and anomaly detection methods for embedded
systems.
This book comprehensively covers the state-of-the-art security
applications of machine learning techniques. The first part
explains the emerging solutions for anti-tamper design, IC
Counterfeits detection and hardware Trojan identification. It also
explains the latest development of deep-learning-based modeling
attacks on physically unclonable functions and outlines the design
principles of more resilient PUF architectures. The second
discusses the use of machine learning to mitigate the risks of
security attacks on cyber-physical systems, with a particular focus
on power plants. The third part provides an in-depth insight into
the principles of malware analysis in embedded systems and
describes how the usage of supervised learning techniques provides
an effective approach to tackle software vulnerabilities.
This book discusses the design principles of physically unclonable
functions (PUFs) and how these can be employed in hardware-based
security applications, in particular, the book provides readers
with a comprehensive overview of security threats and existing
countermeasures. This book has many features that make it a unique
source for students, engineers and educators, including more than
80 problems and worked exercises, in addition to, approximately 200
references, which give extensive direction for further reading.
This book discusses the design principles of physically unclonable
functions (PUFs) and how these can be employed in hardware-based
security applications, in particular, the book provides readers
with a comprehensive overview of security threats and existing
countermeasures. This book has many features that make it a unique
source for students, engineers and educators, including more than
80 problems and worked exercises, in addition to, approximately 200
references, which give extensive direction for further reading.
This book comprehensively covers the state-of-the-art security
applications of machine learning techniques. The first part
explains the emerging solutions for anti-tamper design, IC
Counterfeits detection and hardware Trojan identification. It also
explains the latest development of deep-learning-based modeling
attacks on physically unclonable functions and outlines the design
principles of more resilient PUF architectures. The second
discusses the use of machine learning to mitigate the risks of
security attacks on cyber-physical systems, with a particular focus
on power plants. The third part provides an in-depth insight into
the principles of malware analysis in embedded systems and
describes how the usage of supervised learning techniques provides
an effective approach to tackle software vulnerabilities.Â
This book presents a new threat modelling approach that
specifically targets the hardware supply chain, covering security
risks throughout the lifecycle of an electronic system. The authors
present a case study on a new type of security attack, which
combines two forms of attack mechanisms from two different stages
of the IC supply chain. More specifically, this attack targets the
newly developed, light cipher (Ascon) and demonstrates how it can
be broken easily, when its implementation is compromised with a
hardware Trojan. This book also discusses emerging countermeasures,
including anti-counterfeit design techniques for resources
constrained devices and anomaly detection methods for embedded
systems.
This book provides comprehensive coverage of state-of-the-art
integrated circuit authentication techniques, including
technologies, protocols and emerging applications. The authors
first discuss emerging solutions for embedding unforgeable
identifies into electronics devices, using techniques such as IC
fingerprinting, physically unclonable functions and
voltage-over-scaling. Coverage then turns to authentications
protocols, with a special focus on resource-constrained devices,
first giving an overview of the limitation of existing solutions
and then presenting a number of new protocols, which provide better
physical security and lower energy dissipation. The third part of
the book focuses on emerging security applications for
authentication schemes, including securing hardware supply chains,
hardware-based device attestation and GPS spoofing attack detection
and survival. Provides deep insight into the security threats
undermining existing integrated circuit authentication techniques;
Includes an in-depth discussion of the emerging technologies used
to embed unforgeable identifies into electronics systems; Offers a
comprehensive summary of existing authentication protocols and
their limitations; Describes state-of-the-art authentication
protocols that provide better physical security and more efficient
energy consumption; Includes detailed case studies on the emerging
applications of IC authentication schemes.
This book provides comprehensive coverage of the latest research
into integrated circuits' ageing, explaining the causes of this
phenomenon, describing its effects on electronic systems, and
providing mitigation techniques to build ageing-resilient circuits.
|
You may like...
Higher
Michael Buble
CD
(1)
R459
Discovery Miles 4 590
|