๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

System-on-Chip Security: Validation and Verification

โœ Scribed by Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra


Publisher
Springer International Publishing
Year
2020
Tongue
English
Leaves
295
Edition
1st ed. 2020
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.

โœฆ Table of Contents


Front Matter ....Pages i-xix
System-on-Chip Security Vulnerabilities (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 1-13
SoC Security Verification Challenges (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 15-35
SoC Trust Metrics and Benchmarks (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 37-57
Anomaly Detection Using Symbolic Algebra (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 59-97
Trojan Localization Using Symbolic Algebra (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 99-114
Vulnerability Assessment of Controller Designs (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 115-135
SoC Security Verification Using Property Checking (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 137-152
Automated Test Generation for Detection of Malicious Functionality (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 153-171
Trojan Detection Using Machine Learning (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 173-188
Trojan Detection Using Dynamic Current Analysis (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 189-219
Hardware Trojan Detection Schemes Using Path Delay and Side-Channel Analysis (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 221-271
The Future of Security Validation and Verification (Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra)....Pages 273-279
Back Matter ....Pages 281-289

โœฆ Subjects


Engineering; Circuits and Systems; Processor Architectures; Electronics and Microelectronics, Instrumentation


๐Ÿ“œ SIMILAR VOLUMES


Security Policy in System-on-Chip Design
โœ Sandip Ray, Abhishek Basak, Swarup Bhunia ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs โ€“ current industrial practice, as well as emerging approaches to architecting SoC security policies and security pol

System-on-a-Chip Verification: Methodolo
โœ Prakash Rashinkar, Peter Paterson, Leena Singh (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Springer US ๐ŸŒ English

<p><em>System-On-a-Chip Verification: Methodology and Techniques</em> is the first book to cover verification strategies and methodologies for SOC verification from system level verification to the design sign- off. The topics covered include Introduction to the SOC design and verification aspects,

System-on-a-Chip Verification: Methodolo
โœ Prakash Rashinkar, Peter Paterson, Leena Singh ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Springer ๐ŸŒ English

The combination of previously separate elements into one lone chip presents engineers with challenges to traditional verification approaches. This guide provides a series of tools and techniques that can be employed for system-on-chip (SOC) verification and design error reduction. The authors, who w

Verification and Validation of Rule-Base
โœ Suzanne Smith (Author); Abraham Kandel (Author) ๐Ÿ“‚ Library ๐Ÿ“… 1993 ๐Ÿ› CRC Press

<p>This book presents an innovative approach to verifying and validating rule-based expert systems. It features a complete set of techniques and tools that provide a more formal, objective, and automated means of carrying out verification and validation procedures. Many of the concepts behind these

RFID Security: Techniques, Protocols and
โœ Andreas Hagl, Konstantin Aslanidis (auth.), Paris Kitsos, Yan Zhang (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen

RFID Security: Techniques, Protocols and
โœ Andreas Hagl, Konstantin Aslanidis (auth.), Paris Kitsos, Yan Zhang (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen