MARC보기
LDR05135cmm u2200997Ii 4500
001000000316664
003OCoLC
00520230525180913
006m d
007cr |n|||||||||
008190326t20192019enka fob 001 0 eng d
020 ▼a 1785618008
020 ▼a 9781785618000 ▼q (electronic bk.)
020 ▼z 9781785617997 ▼q (hardback)
020 ▼z 1785617990 ▼q (hardback)
035 ▼a 2339150 ▼b (N$T)
035 ▼a (OCoLC)1101299648
040 ▼a STF ▼b eng ▼e rda ▼c STF ▼d OCLCO ▼d CDN ▼d OCLCF ▼d OCLCQ ▼d UIU ▼d CUS ▼d YDX ▼d EBLCP ▼d N$T ▼d 248032
049 ▼a MAIN
050 4 ▼a TK5105.567 ▼b S45 2019
072 7 ▼a B0100 ▼2 inspec
072 7 ▼a B1265G ▼2 inspec
072 7 ▼a C0000 ▼2 inspec
072 7 ▼a C0230B ▼2 inspec
072 7 ▼a C5135 ▼2 inspec
072 7 ▼a C5480 ▼2 inspec
08204 ▼a 004.62 ▼2 23
1001 ▼a Sengupta, Anirban, ▼e author.
24510 ▼a IP core protection and hardware-assisted security for consumer electronics / ▼c Anirban Sengupta and Saraju P. Mohanty.
260 ▼a London : ▼b Institution of Engineering and Technology, ▼c 2019.
300 ▼a 1 online resource (xlvii, 504 pages) : ▼b illustrations.
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
4901 ▼a IET materials, circuits and devices series ; ▼v 60
504 ▼a Includes bibliographical references and index.
520 ▼a The book addresses the general issue of protecting hardware (especially DSP cores) of consumer electronics (CE) as well as data on CE, including new demands created by IoT enabled products. It also addresses the potential threats from intervention in the CE design supply chain and how these threats can be circumvented. These supply chain security solutions may include hardware watermarking, hardware fingerprinting, symmetrical IP core protection, hardware metering, computational forensic engineering for IP core protection, and various forms of hardware obfuscation. It explores and addresses many different types of security attacks that can be launched against CE products, including power and timing "side channel" attacks, as well as backdoor and brute-force attacks. Methods are discussed for defeating/blocking Trojan horse attacks as well as reverse engineering attacks. The book discusses the latest methods for active and passive IP core security of DSP cores used in CE device and protection mechanisms for the buyers of ICs and incorporated IP that includes "watermarking"and "fingerprinting"as well as structural obfuscation, functional obfuscation, hardware AES, watermarked AES, and physically unclonable functions (PUFs). It also explores the use of forensic engineering for resolving ownership issues for reusable digital signal processing (DSP) IP cores. In addition to these direct security concerns, it discusses the trade-offs of energy consumption, security and performance for CE hardware.
5880 ▼a Online resource; title from PDF title page (IET, viewed September 20, 2019).
590 ▼a Added to collection customer.56279.3
650 0 ▼a IPSec (Computer network protocol)
650 0 ▼a Computer security.
650 0 ▼a Household electronics ▼x Security measures.
650 0 ▼a Microprocessors.
650 0 ▼a Signal processing ▼x Digital techniques.
650 7 ▼a Industrial property. ▼2 fast ▼0 (OCoLC)fst00971584
650 7 ▼a Microprocessors. ▼2 fast ▼0 (OCoLC)fst01020008
650 7 ▼a Signal processing ▼x Digital techniques. ▼2 fast ▼0 (OCoLC)fst01118285
650 7 ▼a consumer electronics. ▼2 inspect
650 7 ▼a digital signal processing chips. ▼2 inspect
650 7 ▼a industrial property. ▼2 inspect
650 7 ▼a reverse engineering. ▼2 inspect
650 7 ▼a security. ▼2 inspect
650 7 ▼a supply chains. ▼2 inspect
653 ▼a intellectual property
653 ▼a energy consumption
653 ▼a reusable digital signal processing IP cores
653 ▼a ownership issues
653 ▼a physically unclonable functions
653 ▼a watermarked AES
653 ▼a hardware AES
653 ▼a functional obfuscation
653 ▼a structural obfuscation
653 ▼a reverse engineering attacks
653 ▼a Trojan horse attacks
653 ▼a brute-force attacks
653 ▼a backdoor attacks
653 ▼a side channel attacks
653 ▼a hardware obfuscation
653 ▼a computational forensic engineering
653 ▼a hardware metering
653 ▼a hardware fingerprinting
653 ▼a hardware watermarking
653 ▼a design supply chain
653 ▼a hardware protection
653 ▼a DSP cores
653 ▼a hardware-assisted security
653 ▼a IP core protection
653 ▼a consumer electronics
655 4 ▼a Electronic books.
7001 ▼a Mohanty, Saraju P., ▼e author.
830 0 ▼a Materials, circuits and devices series ; ▼v 60.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2339150
938 ▼a ProQuest Ebook Central ▼b EBLB ▼n EBL6026421
938 ▼a YBP Library Services ▼b YANK ▼n 301049520
938 ▼a EBSCOhost ▼b EBSC ▼n 2339150
990 ▼a 관리자
994 ▼a 92 ▼b N$T