000 | 04465nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-69131-8 | ||
003 | DE-He213 | ||
005 | 20220801220327.0 | ||
007 | cr nn 008mamaa | ||
008 | 210503s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030691318 _9978-3-030-69131-8 |
||
024 | 7 |
_a10.1007/978-3-030-69131-8 _2doi |
|
050 | 4 | _aTK7895.E42 | |
072 | 7 |
_aUKM _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aUKM _2thema |
|
082 | 0 | 4 |
_a006.22 _223 |
245 | 1 | 0 |
_aNetwork-on-Chip Security and Privacy _h[electronic resource] / _cedited by Prabhat Mishra, Subodha Charles. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXII, 496 p. 213 illus., 199 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction to System-on-Chip Design using Network-on-Chip -- Network-on-Chip Security Challenges due to Supply Chain -- Characterizing and Optimizing Performance in NoC Architectures -- Characterizing and Optimizing Energy in NoC Architectures -- Modeling NoC in Architectural Simulators -- Eavesdropping Attacks -- Data Integrity Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks -- Emerging Security Vulnerabilities in NoC-based SoCs -- Lightweight Encryption and authentication in NoC-based SoCs -- Trust-aware Routing in NoC-based SoCs -- Route and Data Randomization in NoC-based SoCs -- Mitigating Side-Channel Attacks in NoC-based SoCs -- Real-time Detection and Localization of DoS attacks -- Digital Watermarking for Detecting Malicious IP Cores -- Authorization for NoC Resource Accesses -- Formal Verification of NoC Security Properties -- NoC Trust Verification using Security Assertions -- Securing Optical/Photonic NoC -- Securing Wireless NoC -- Securing 2.5 and 3D NoC -- Future of Trustworthy On-Chip Communication -- Conclusions and Future Directions. . | |
520 | _aThis book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems. Provides a comprehensive overview of NoC security vulnerabilities for diverse on-chip communication architectures, including bus, mesh, ring, star, and hybrid network topologies; Describes state-of-the-art security solutions for defending against a wide spectrum of attacks, including malicious implants (e.g., hardware Trojans), eavesdropping, information leakage, spoofing, denial-of-service, and erroneous execution; Covers a wide variety of NoC attacks and effective countermeasures for diverse communication technologies, including electrical, optical (photonic) and wireless NoCs; Presents lightweight static (design-for-trust), as well as dynamic (runtime) security solutions; Enables security validation using an effective combination of formal methods, assertion-based validation, side-channel analysis, and machine learning; Discusses trade-offs between on-chip communication security and energy-efficient implementation in resource constrained embedded systems and IoT devices. | ||
650 | 0 |
_aEmbedded computer systems. _97792 |
|
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aMicroprocessors. _949668 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aEmbedded Systems. _932486 |
650 | 2 | 4 |
_aElectronic Circuits and Systems. _949669 |
650 | 2 | 4 |
_aProcessor Architectures. _949670 |
700 | 1 |
_aMishra, Prabhat. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949671 |
|
700 | 1 |
_aCharles, Subodha. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949672 |
|
710 | 2 |
_aSpringerLink (Online service) _949673 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030691301 |
776 | 0 | 8 |
_iPrinted edition: _z9783030691325 |
776 | 0 | 8 |
_iPrinted edition: _z9783030691332 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-69131-8 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78449 _d78449 |