• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Behavioral Synthesis for Hardware Security » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Behavioral Synthesis for Hardware Security

ISBN-13: 9783030788438 / Angielski / Miękka / 2023 / 398 str.

Srinivas Katkoori; Sheikh Ariful Islam
Behavioral Synthesis for Hardware Security Srinivas Katkoori Sheikh Ariful Islam 9783030788438 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Behavioral Synthesis for Hardware Security

ISBN-13: 9783030788438 / Angielski / Miękka / 2023 / 398 str.

Srinivas Katkoori; Sheikh Ariful Islam
cena 363,12
(netto: 345,83 VAT:  5%)

Najniższa cena z 30 dni: 346,96
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection.

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.

  • Provides a single-source reference to behavioral synthesis for hardware security;
  • Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;
  • Includes behavioral synthesis techniques for intellectual property protection.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Electronics - Circuits - General
Technology & Engineering > Electrical
Computers > Computer Architecture
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9783030788438
Rok wydania:
2023
Dostępne języki:
Ilość stron:
398
Waga:
0.64 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Introduction.- Background.- Techniques for algorithm-level obfuscation during high-level synthesis.- High-level synthesis of key based obfuscated RTL datapaths.- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation.- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility.- Behavioral synthesis techniques for intellectual property protection.- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis.- High-Level Synthesis for Side-Channel Defense.- On state encoding against power analysis attacks for finite state controllers.- Examining the consequences of high-level synthesis optimizations on power side-channel.- Towards a timing attack aware high-level synthesis of integrated circuits.- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement.- Mitigating information leakage during critical communication using S*FSM.- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling.- Securing industrial control system with high level synthesis.- Conclusions and open research problems.

Srinivas Katkoori is an Associate Professor of Computer Science and Engineering at the

University of South Florida, Florida, Tampa, FL, USA. His research interests include VLSI design and CAD, high-level synthesis, low power VLSI synthesis, IC reliability, evolutionary algorithms, and hardware security. He has authored over 100 peer-reviewed journal and conference papers. He holds one U.S. patent (6 963 217). He was a recipient of the 2001 NSF Career Award, the 2002–2003 USF Outstanding Faculty Research Achievement Award, the 2005 Outstanding Engineering Educator Award from the IEEE Florida Council (Region 3), the 2007–2008 USF Undergraduate Teaching Award, and the 2013 USF Jerome Krivanek Distinguished Teacher Award. Dr. Katkoori received the Ph.D. degree from the University of Cincinnati, Cincinnati, OH, USA, in 1998. Dr. Katkoori is a Senior Member of ACM and IEEE.

 

Sheikh Ariful Islam received the B.Sc. degree in Electronics and Communication Engineering from Khulna University of Engineering and Technology, Bangladesh, in 2011. He is currently pursuing Ph.D. degree in Computer Engineering at the University of South Florida, Tampa. His current research interests include the development of security and reliability aware high-level synthesis tools. To date, he has published 7 papers in peer-reviewed conferences and journals. He received best paper nomination at 2018 AsianHOST Conference held in Hong Kong. Before he joined USF, he served as lecturer in Bangladesh for two years. He has extensive teaching experience in computer architecture and system design. He completed an internship at ON Semiconductor in Fall 2018. 

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.

  • Provides a single-source reference to behavioral synthesis for hardware security;
  • Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;
  • Includes behavioral synthesis techniques for intellectual property protection.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia