MARC 닫기
05135cam a2200997Ii 4500
000000532559
20210114162446
m d
cr |n|||||||||
190326t20192019enka fob 001 0 eng d
▼a 1785618008
▼a 9781785618000
▼q (electronic bk.)
▼z 9781785617997
▼q (hardback)
▼z 1785617990
▼q (hardback)
▼a 2339150
▼b (N$T)
▼a (OCoLC)1101299648
▼a STF
▼b eng
▼e rda
▼c STF
▼d OCLCO
▼d CDN
▼d OCLCF
▼d OCLCQ
▼d UIU
▼d CUS
▼d YDX
▼d EBLCP
▼d N$T
▼d 248023
▼a TK5105.567
▼b S45 2019
▼a B0100
▼2 inspec
▼a B1265G
▼2 inspec
▼a C0000
▼2 inspec
▼a C0230B
▼2 inspec
▼a C5135
▼2 inspec
▼a C5480
▼2 inspec
▼a 004.62
▼2 23
▼a Sengupta, Anirban,
▼e author.
▼a IP core protection and hardware-assisted security for consumer electronics /:
▼c Anirban Sengupta and Saraju P. Mohanty.
▼a London:
▼b Institution of Engineering and Technology,
▼c 2019.
▼a 1 online resource (xlvii, 504 pages):
▼b illustrations.
▼a text
▼b txt
▼2 rdacontent
▼a computer
▼b c
▼2 rdamedia
▼a online resource
▼b cr
▼2 rdacarrier
▼a IET materials, circuits and devices series;
▼v 60
▼a Includes bibliographical references and index.
▼a The book addresses the general issue of protecting hardware (especially DSP cores) of consumer electronics (CE) as well as data on CE, including new demands created by IoT enabled products. It also addresses the potential threats from intervention in the CE design supply chain and how these threats can be circumvented. These supply chain security solutions may include hardware watermarking, hardware fingerprinting, symmetrical IP core protection, hardware metering, computational forensic engineering for IP core protection, and various forms of hardware obfuscation. It explores and addresses many different types of security attacks that can be launched against CE products, including power and timing "side channel" attacks, as well as backdoor and brute-force attacks. Methods are discussed for defeating/blocking Trojan horse attacks as well as reverse engineering attacks. The book discusses the latest methods for active and passive IP core security of DSP cores used in CE device and protection mechanisms for the buyers of ICs and incorporated IP that includes "watermarking"and "fingerprinting"as well as structural obfuscation, functional obfuscation, hardware AES, watermarked AES, and physically unclonable functions (PUFs). It also explores the use of forensic engineering for resolving ownership issues for reusable digital signal processing (DSP) IP cores. In addition to these direct security concerns, it discusses the trade-offs of energy consumption, security and performance for CE hardware.
▼a Online resource; title from PDF title page (IET, viewed September 20, 2019).
▼a Added to collection customer.56279.3
▼a IPSec (Computer network protocol)
▼a Computer security.
▼a Household electronics
▼x Security measures.
▼a Microprocessors.
▼a Signal processing
▼x Digital techniques.
▼a Industrial property.
▼2 fast
▼0 (OCoLC)fst00971584
▼a Microprocessors.
▼2 fast
▼0 (OCoLC)fst01020008
▼a Signal processing
▼x Digital techniques.
▼2 fast
▼0 (OCoLC)fst01118285
▼a consumer electronics.
▼2 inspect
▼a digital signal processing chips.
▼2 inspect
▼a industrial property.
▼2 inspect
▼a reverse engineering.
▼2 inspect
▼a security.
▼2 inspect
▼a supply chains.
▼2 inspect
▼a Electronic books.
▼a Mohanty, Saraju P.,
▼e author.
▼a Materials, circuits and devices series;
▼v 60.
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2339150
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL6026421
▼a YBP Library Services
▼b YANK
▼n 301049520
▼a EBSCOhost
▼b EBSC
▼n 2339150
▼a 강리원
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 1785618008 |
| ISBN : | 9781785618000 |
| ISBN : | |
| ISBN : | |
| 개인저자 : | Sengupta, Anirban, author. |
| 서명/저자사항 : | IP core protection and hardware-assisted security for consumer electronics /: Anirban Sengupta and Saraju P. Mohanty. |
| 발행사항 : | London: Institution of Engineering and Technology, 2019. |
| 형태사항 : | 1 online resource (xlvii, 504 pages): illustrations. |
| 총서사항 : | IET materials, circuits and devices series; 60 |
| 서지주기 : | Includes bibliographical references and index. |
| 요약 : | The book addresses the general issue of protecting hardware (especially DSP cores) of consumer electronics (CE) as well as data on CE, including new demands created by IoT enabled products. It also addresses the potential threats from intervention in the CE design supply chain and how these threats can be circumvented. These supply chain security solutions may include hardware watermarking, hardware fingerprinting, symmetrical IP core protection, hardware metering, computational forensic engineering for IP core protection, and various forms of hardware obfuscation. It explores and addresses many different types of security attacks that can be launched against CE products, including power and timing "side channel" attacks, as well as backdoor and brute-force attacks. Methods are discussed for defeating/blocking Trojan horse attacks as well as reverse engineering attacks. The book discusses the latest methods for active and passive IP core security of DSP cores used in CE device and protection mechanisms for the buyers of ICs and incorporated IP that includes "watermarking"and "fingerprinting"as well as structural obfuscation, functional obfuscation, hardware AES, watermarked AES, and physically unclonable functions (PUFs). It also explores the use of forensic engineering for resolving ownership issues for reusable digital signal processing (DSP) IP cores. In addition to these direct security concerns, it discusses the trade-offs of energy consumption, security and performance for CE hardware. |
| 일반주제명 : | IPSec (Computer network protocol) -- |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | Household electronics -- Security measures. -- |
| 일반주제명 : | Microprocessors. -- |
| 일반주제명 : | Signal processing -- Digital techniques. -- |
| 일반주제명 : | Industrial property. -- |
| 일반주제명 : | Microprocessors. -- |
| 일반주제명 : | Signal processing -- Digital techniques. -- |
| 일반주제명 : | consumer electronics. -- |
| 일반주제명 : | digital signal processing chips. -- |
| 일반주제명 : | industrial property. -- |
| 일반주제명 : | reverse engineering. -- |
| 일반주제명 : | security. -- |
| 일반주제명 : | supply chains. -- |
| 개인저자 : | Mohanty, Saraju P., author. |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기