000 04218nam a22005535i 4500
001 978-3-319-93464-8
003 DE-He213
005 20220801213536.0
007 cr nn 008mamaa
008 181009s2019 sz | s |||| 0|eng d
020 _a9783319934648
_9978-3-319-93464-8
024 7 _a10.1007/978-3-319-93464-8
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aRay, Sandip.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_932735
245 1 0 _aSecurity Policy in System-on-Chip Designs
_h[electronic resource] :
_bSpecification, Implementation and Verification /
_cby Sandip Ray, Abhishek Basak, Swarup Bhunia.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aIX, 116 p. 30 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter1: SoC Security Policies: The State of the Practice -- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture -- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture -- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks -- Chapter5: A Move Towards a Hardware Patch -- Chapter6: SoC Security Policy Verification -- Chapter7: SoC Security Policies: Summary and Future Directions.
520 _aThis book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_932736
650 0 _aComputer architecture.
_93513
650 0 _aElectronics.
_93425
650 1 4 _aElectronic Circuits and Systems.
_932737
650 2 4 _aProcessor Architectures.
_932738
650 2 4 _aElectronics and Microelectronics, Instrumentation.
_932249
700 1 _aBasak, Abhishek.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_932739
700 1 _aBhunia, Swarup.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_932740
710 2 _aSpringerLink (Online service)
_932741
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319934631
776 0 8 _iPrinted edition:
_z9783319934655
776 0 8 _iPrinted edition:
_z9783030066666
856 4 0 _uhttps://doi.org/10.1007/978-3-319-93464-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75302
_d75302