Deep Learning for Computational Problems in Hardware Security [electronic resource] : Modeling Attacks on Strong Physically Unclonable Function Circuits / by Pranesh Santikellur, Rajat Subhra Chakraborty.

Por: Santikellur, Pranesh [author.]Colaborador(es): Chakraborty, Rajat Subhra [author.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Studies in Computational Intelligence ; 1052Editor: Singapore : Springer Nature Singapore : Imprint: Springer, 2023Edición: 1st ed. 2023Descripción: XIII, 84 p. 31 illus., 18 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789811940170Tema(s): Electronic circuits | Artificial intelligence | Mathematics | Computers, Special purpose | Computer science | Electronic Circuits and Systems | Artificial Intelligence | Mathematics in Popular Science | Special Purpose and Application-Based Systems | Computer ScienceFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 621.3815 Clasificación LoC:TK7867-7867.5Recursos en línea: Libro electrónicoTexto
Contenidos:
Chapter 1: Introduction -- Chapter 2: Fundamental Concepts of Machine Learning -- Chapter 3: Supervised Machine Learning Algorithms for PUF Modeling Attacks -- Chapter 4: Deep Learning based PUF Modeling Attacks -- Chapter 5: Tensor Regression based PUF Modeling Attack -- Chapter 6: Binarized Neural Network based PUF Modeling -- Chapter 7: Conclusions and Future Work. .
En: Springer Nature eBookResumen: The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

Chapter 1: Introduction -- Chapter 2: Fundamental Concepts of Machine Learning -- Chapter 3: Supervised Machine Learning Algorithms for PUF Modeling Attacks -- Chapter 4: Deep Learning based PUF Modeling Attacks -- Chapter 5: Tensor Regression based PUF Modeling Attack -- Chapter 6: Binarized Neural Network based PUF Modeling -- Chapter 7: Conclusions and Future Work. .

The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.

UABC ; Perpetuidad

Con tecnología Koha