<b>The first book to introduce computer architecture for security and provide the tools to implement secure computer systems</b>This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security pe
Secure System Design and Trustable Computing
โ Scribed by Chip-Hong Chang, Miodrag Potkonjak (eds.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 537
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern societyโs microelectronic-supported infrastructures.
โฆ Table of Contents
Front Matter....Pages i-xii
Front Matter....Pages 1-1
Disorder-Based Security Hardware: An Overview....Pages 3-37
Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-Oriented Cryptography....Pages 39-81
Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications....Pages 83-113
Residue Number Systems in Cryptography: Design, Challenges, Robustness....Pages 115-161
Fault Attacks on AES and Their Countermeasures....Pages 163-208
Front Matter....Pages 209-209
Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits....Pages 211-239
Hardware Trojan Detection in Analog/RF Integrated Circuits....Pages 241-268
Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks....Pages 269-299
Towards Building Trusted Systems: Vulnerabilities, Threats, and Mitigation Techniques....Pages 301-328
Hardware IP Watermarking and Fingerprinting....Pages 329-368
IP Protection of FPGA Cores Through a Novel Public/Secret-Key Encryption Mechanism....Pages 369-389
Secure Licensing of IP Cores on SRAM-Based FPGAs....Pages 391-418
Front Matter....Pages 419-419
Heterogeneous Architectures: Malware and Countermeasures....Pages 421-438
Trusted, Heterogeneous, and Autonomic Mobile Cloud....Pages 439-455
Infiltrating Social Network Accounts: Attacks and Defenses....Pages 457-485
An Economical, Deployable and Secure Architecture for the Initial Deployment Stage of Vehicular Ad-Hoc Network....Pages 487-519
Deception-Based Survivability....Pages 521-537
โฆ Subjects
Circuits and Systems; Systems and Data Security; Electronics and Microelectronics, Instrumentation
๐ SIMILAR VOLUMES
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security persp
<span>"A textbook that provides an excellent focus on the advanced topics of the power system and gives exciting analysis methods and a cover of the important applications in the power systems. At the beginning of each chapter is an abstract that states the chapter objectives. Next, the introduction
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic