𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Policy in System-on-Chip Designs: Specification, Implementation and Verification

✍ Scribed by Sandip Ray, Abhishek Basak, Swarup Bhunia


Publisher
Springer International Publishing
Year
2019
Tongue
English
Leaves
124
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for β€œhardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.

  • Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
  • Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
  • Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
  • Introduces a rigorous, disciplined approach to β€œhardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field;
  • Includes discussion of current and emerging approaches for security policy verification.

✦ Table of Contents


Front Matter ....Pages i-ix
SoC Security Policies: The State of the Practice (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 1-12
E-IIPS: A Centralized Policy Implementation Architecture (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 13-28
Exploiting Design-for-Debug in SoC Security Policy Architecture (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 29-44
Security Assurance in SoC in the Presence of Untrusted Components (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 45-79
A Move Towards a Hardware Patch (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 81-92
SoC Security Policy Verification (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 93-106
SoC Security Policies: Summary and Future Directions (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 107-108
Back Matter ....Pages 109-116

✦ Subjects


Engineering; Circuits and Systems; Processor Architectures; Electronics and Microelectronics, Instrumentation


πŸ“œ SIMILAR VOLUMES


System-on-Chip Security: Validation and
✍ Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing 🌐 English

<p><p>This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and sid

Integrated Security Systems Design: Conc
✍ Thomas L. Norman CPP PSP CSC πŸ“‚ Library πŸ“… 2007 πŸ› Butterworth-Heinemann 🌐 English

A few references you like to keep handy for quick reference as authoritative sources. Sources that offer a progressive history across the full spectrum of security systems development while pointing the way toward the future development of the security systems marketplace. This book is one of thos

RFID Security: Techniques, Protocols and
✍ Andreas Hagl, Konstantin Aslanidis (auth.), Paris Kitsos, Yan Zhang (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer US 🌐 English

<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen

RFID Security: Techniques, Protocols and
✍ Andreas Hagl, Konstantin Aslanidis (auth.), Paris Kitsos, Yan Zhang (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer US 🌐 English

<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen

RFID Security: Techniques, Protocols and
✍ Paris Kitsos (editor), Yan Zhang (editor) πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

<p><span>RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID

Security Policies and Implementation Iss
✍ Robert Johnson, Chuck Easttom πŸ“‚ Library πŸ“… 2020 πŸ› Jones & Bartlett Learning 🌐 English

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psycho