000 | 03603nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-26896-0 | ||
003 | DE-He213 | ||
005 | 20240207153813.0 | ||
007 | cr nn 008mamaa | ||
008 | 230511s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031268960 _9978-3-031-26896-0 |
||
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aFarahmandi, Farimah. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCAD for Hardware Security _h[electronic resource] / _cby Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXVIII, 407 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
500 | _aAcceso multiusuario | ||
505 | 0 | _aIntroduction -- CAD for Information Leakage Assessment -- CAD for Power Side Channel Leakage Assessment -- CAD for Electromagnetic Radiation Leakage Assessment -- CAD for Timing Leakage Assessment -- CAD for Fault Injection Attack Analysis -- CAD for Obfuscation -- CAD for Watermarking -- CAD for HW Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD for Trojan Detection and Prevention -- CAD for Physical Assurance -- CAD for Anti-Probing -- CAD for Formal Security Verification -- CAD for Reverse Engineering. | |
520 | _aThis book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a comprehensive understanding of SoC security vulnerabilities and how to overcome them, through an efficient combination of proactive countermeasures and a wide variety of CAD solutions. Offers techniques to protect hardware designs from a variety of vulnerabilities using CAD; Provides a comprehensive introduction to current SoC security vulnerabilities at different levels of abstraction; Discusses CAD-based approaches and their application to SoC security issues at various levels of design abstraction. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aInternet of things. | |
650 | 0 | _aMicroprocessors. | |
650 | 0 | _aComputer architecture. | |
650 | 1 | 4 | _aElectronic Circuits and Systems. |
650 | 2 | 4 | _aInternet of Things. |
650 | 2 | 4 | _aProcessor Architectures. |
700 | 1 |
_aRahman, M. Sazadur. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aRajendran, Sree Ranjani. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aTehranipoor, Mark. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031268953 |
776 | 0 | 8 |
_iPrinted edition: _z9783031268977 |
776 | 0 | 8 |
_iPrinted edition: _z9783031268984 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-26896-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c263671 _d263670 |