๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Secure System Design and Trustable Computing

โœ Scribed by Chip-Hong Chang, Miodrag Potkonjak (eds.)


Publisher
Springer International Publishing
Year
2016
Tongue
English
Leaves
537
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern societyโ€™s microelectronic-supported infrastructures.

โœฆ Table of Contents


Front Matter....Pages i-xii
Front Matter....Pages 1-1
Disorder-Based Security Hardware: An Overview....Pages 3-37
Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-Oriented Cryptography....Pages 39-81
Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications....Pages 83-113
Residue Number Systems in Cryptography: Design, Challenges, Robustness....Pages 115-161
Fault Attacks on AES and Their Countermeasures....Pages 163-208
Front Matter....Pages 209-209
Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits....Pages 211-239
Hardware Trojan Detection in Analog/RF Integrated Circuits....Pages 241-268
Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks....Pages 269-299
Towards Building Trusted Systems: Vulnerabilities, Threats, and Mitigation Techniques....Pages 301-328
Hardware IP Watermarking and Fingerprinting....Pages 329-368
IP Protection of FPGA Cores Through a Novel Public/Secret-Key Encryption Mechanism....Pages 369-389
Secure Licensing of IP Cores on SRAM-Based FPGAs....Pages 391-418
Front Matter....Pages 419-419
Heterogeneous Architectures: Malware and Countermeasures....Pages 421-438
Trusted, Heterogeneous, and Autonomic Mobile Cloud....Pages 439-455
Infiltrating Social Network Accounts: Attacks and Defenses....Pages 457-485
An Economical, Deployable and Secure Architecture for the Initial Deployment Stage of Vehicular Ad-Hoc Network....Pages 487-519
Deception-Based Survivability....Pages 521-537

โœฆ Subjects


Circuits and Systems; Systems and Data Security; Electronics and Microelectronics, Instrumentation


๐Ÿ“œ SIMILAR VOLUMES


Computer Architecture and Security: Fund
โœ Wang, Shuangbao(Contributor);Ledley, Robert S ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley ๐ŸŒ English

<b>The first book to introduce computer architecture for security and provide the tools to implement secure computer systems</b>This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security pe

Computer architecture and security: fund
โœ Shuangbao (Paul) Wang, Robert S. Ledley ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Higher Education Press ๐ŸŒ English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security persp

Advanced Power Systems and Security: Com
โœ Samir Ibrahim Abood (editor), Muna Hamid Fayyadh (editor) ๐Ÿ“‚ Library ๐Ÿ› Nova Science Pub Inc ๐ŸŒ English

<span>"A textbook that provides an excellent focus on the advanced topics of the power system and gives exciting analysis methods and a cover of the important applications in the power systems. At the beginning of each chapter is an abstract that states the chapter objectives. Next, the introduction

Secure Computer and Network Systems Mode
โœ Ye, Nong ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Wiley ๐ŸŒ English

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic

Secure Computer and Network Systems: Mod
โœ Nong Ye ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Wiley ๐ŸŒ English

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic