Secure System Design and Trustable Computing -

Secure System Design and Trustable Computing

Buch | Softcover
XII, 537 Seiten
2016 | 1. Softcover reprint of the original 1st ed. 2016
Springer International Publishing (Verlag)
978-3-319-35221-3 (ISBN)
149,98 inkl. MwSt

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society's microelectronic-supported infrastructures.

Chip-Hong Chang received his Ph.D. degree from Nanyang Technological University (NTU) of Singapore in 1998. He served as a Technical Consultant in industry prior to joining the School of Electrical and Electronic Engineering (EEE) of NTU in 1999, where he is currently an Associate Professor. He held joint appointments with the university as Assistant Chair of the School of EEE from 2008 to 2014, Deputy Director of the Center for High Performance Embedded Systems from 2000 to 2011, and Program Director of the Center for Integrated Circuits and Systems from 2003 to 2009. He edited and coedited two books, published eight book chapters, and more than 200 refereed international journal and conference papers in hardware-oriented security, low power arithmetic circuits, residue number systems and digital filter design. He is a Fellow of IET.

Part I : Hardware Security Primitives.- Disorder-Based Security Hardware: An Overview.- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography.- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications.- Residue number systems in cryptography: design, challenges, robustness.- Fault Attacks on AES and their Countermeasures.- Hardware Counterfeiting and Integrity Protection.- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits.- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs.- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks.- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques.- Hardware IP Watermarking and Fingerprinting.

Erscheinungsdatum
Zusatzinfo XII, 537 p.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 836 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Schlagworte cyber security • Digital Rights Management of Integrated Circuits • Embedded Security • Hardware security and trust • Hardware Trojans Detection • physical unclonable functions • Secure System Design • Security and Privacy in Internet of Things • Trustable Computing • Trusted Mobile and Smart Devices
ISBN-10 3-319-35221-0 / 3319352210
ISBN-13 978-3-319-35221-3 / 9783319352213
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95