000 03605nam a22005655i 4500
001 978-3-030-18163-5
003 DE-He213
005 20220801214741.0
007 cr nn 008mamaa
008 190528s2020 sz | s |||| 0|eng d
020 _a9783030181635
_9978-3-030-18163-5
024 7 _a10.1007/978-3-030-18163-5
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aTang, Jack.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_940222
245 1 0 _aSecure and Trustworthy Cyberphysical Microfluidic Biochips
_h[electronic resource] :
_bA practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips /
_cby Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty, Ramesh Karri.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXIV, 144 p. 51 illus., 42 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1. Cyberphysical Microfluidic Biochips -- Chapter 2. Security and Trust -- Chapter 3. Prevention: Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips -- Chapter 4. Detection: Randomizing Checkpoints on Cyberphysical Digital Microfluidic Biochips -- Chapter 5. Mitigation: Tamper-Mitigating Routing Fabrics -- Chapter 6. Conclusions.
520 _aThis book describes novel hardware security and microfluidic biochip design methodologies to protect against tampering attacks in cyberphysical microfluidic biochips (CPMBs). It also provides a general overview of this nascent area of research, which will prove to be a vital resource for practitioners in the field.This book shows how hardware-based countermeasures and design innovations can be a simple and effective last line of defense, demonstrating that it is no longer justifiable to ignore security and trust in the design phase of biochips. Provides a high-level overview of emerging security threats facing cyberphysical microfluidic biochips Discusses hardware design for the prevention of tampering attacks on DMFBs Describes techniques for detection of tampering attacks on DMFBs Presents methodology for hardware-based mitigation of tampering attacks on flow-based routing fabrics.
650 0 _aElectronic circuits.
_919581
650 0 _aBiomedical engineering.
_93292
650 0 _aMicroprocessors.
_940223
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_940224
650 2 4 _aBiomedical Engineering and Bioengineering.
_931842
650 2 4 _aProcessor Architectures.
_940225
700 1 _aIbrahim, Mohamed.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_940226
700 1 _aChakrabarty, Krishnendu.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_914047
700 1 _aKarri, Ramesh.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_940227
710 2 _aSpringerLink (Online service)
_940228
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030181628
776 0 8 _iPrinted edition:
_z9783030181642
776 0 8 _iPrinted edition:
_z9783030181659
856 4 0 _uhttps://doi.org/10.1007/978-3-030-18163-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76708
_d76708