<p><p>This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and sid
Security Policy in System-on-Chip Designs: Specification, Implementation and Verification
β Scribed by Sandip Ray, Abhishek Basak, Swarup Bhunia
- Publisher
- Springer International Publishing
- Year
- 2019
- Tongue
- English
- Leaves
- 124
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs β current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for βhardware patchingβ, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.
- Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
- Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
- Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
- Introduces a rigorous, disciplined approach to βhardware patchingβ, i.e., secure technique for updating hardware functionality of computing devices in-field;
- Includes discussion of current and emerging approaches for security policy verification.
β¦ Table of Contents
Front Matter ....Pages i-ix
SoC Security Policies: The State of the Practice (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 1-12
E-IIPS: A Centralized Policy Implementation Architecture (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 13-28
Exploiting Design-for-Debug in SoC Security Policy Architecture (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 29-44
Security Assurance in SoC in the Presence of Untrusted Components (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 45-79
A Move Towards a Hardware Patch (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 81-92
SoC Security Policy Verification (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 93-106
SoC Security Policies: Summary and Future Directions (Sandip Ray, Abhishek Basak, Swarup Bhunia)....Pages 107-108
Back Matter ....Pages 109-116
β¦ Subjects
Engineering; Circuits and Systems; Processor Architectures; Electronics and Microelectronics, Instrumentation
π SIMILAR VOLUMES
A few references you like to keep handy for quick reference as authoritative sources. Sources that offer a progressive history across the full spectrum of security systems development while pointing the way toward the future development of the security systems marketplace. This book is one of thos
<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen
<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen
<p><span>RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psycho