<p><p>This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs โ current industrial practice, as well as emerging approaches to architecting SoC security policies and security pol
System-on-Chip Security: Validation and Verification
โ Scribed by Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra
- Publisher
- Springer International Publishing
- Year
- 2020
- Tongue
- English
- Leaves
- 295
- Edition
- 1st ed. 2020
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.
โฆ Table of Contents
Front Matter ....Pages i-xix
System-on-Chip Security Vulnerabilities (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 1-13
SoC Security Verification Challenges (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 15-35
SoC Trust Metrics and Benchmarks (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 37-57
Anomaly Detection Using Symbolic Algebra (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 59-97
Trojan Localization Using Symbolic Algebra (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 99-114
Vulnerability Assessment of Controller Designs (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 115-135
SoC Security Verification Using Property Checking (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 137-152
Automated Test Generation for Detection of Malicious Functionality (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 153-171
Trojan Detection Using Machine Learning (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 173-188
Trojan Detection Using Dynamic Current Analysis (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 189-219
Hardware Trojan Detection Schemes Using Path Delay and Side-Channel Analysis (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 221-271
The Future of Security Validation and Verification (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 273-279
Back Matter ....Pages 281-289
โฆ Subjects
Engineering; Circuits and Systems; Processor Architectures; Electronics and Microelectronics, Instrumentation
๐ SIMILAR VOLUMES
<p><em>System-On-a-Chip Verification: Methodology and Techniques</em> is the first book to cover verification strategies and methodologies for SOC verification from system level verification to the design sign- off. The topics covered include Introduction to the SOC design and verification aspects,
The combination of previously separate elements into one lone chip presents engineers with challenges to traditional verification approaches. This guide provides a series of tools and techniques that can be employed for system-on-chip (SOC) verification and design error reduction. The authors, who w
<p>This book presents an innovative approach to verifying and validating rule-based expert systems. It features a complete set of techniques and tools that provide a more formal, objective, and automated means of carrying out verification and validation procedures. Many of the concepts behind these
<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen
<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen