LDR | | 05135cmm u2200997Ii 4500 |
001 | | 000000316664 |
003 | | OCoLC |
005 | | 20230525180913 |
006 | | m d |
007 | | cr |n||||||||| |
008 | | 190326t20192019enka fob 001 0 eng d |
020 | |
▼a 1785618008 |
020 | |
▼a 9781785618000
▼q (electronic bk.) |
020 | |
▼z 9781785617997
▼q (hardback) |
020 | |
▼z 1785617990
▼q (hardback) |
035 | |
▼a 2339150
▼b (N$T) |
035 | |
▼a (OCoLC)1101299648 |
040 | |
▼a STF
▼b eng
▼e rda
▼c STF
▼d OCLCO
▼d CDN
▼d OCLCF
▼d OCLCQ
▼d UIU
▼d CUS
▼d YDX
▼d EBLCP
▼d N$T
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a TK5105.567
▼b S45 2019 |
072 | 7 |
▼a B0100
▼2 inspec |
072 | 7 |
▼a B1265G
▼2 inspec |
072 | 7 |
▼a C0000
▼2 inspec |
072 | 7 |
▼a C0230B
▼2 inspec |
072 | 7 |
▼a C5135
▼2 inspec |
072 | 7 |
▼a C5480
▼2 inspec |
082 | 04 |
▼a 004.62
▼2 23 |
100 | 1 |
▼a Sengupta, Anirban,
▼e author. |
245 | 10 |
▼a IP core protection and hardware-assisted security for consumer electronics /
▼c Anirban Sengupta and Saraju P. Mohanty. |
260 | |
▼a London :
▼b Institution of Engineering and Technology,
▼c 2019. |
300 | |
▼a 1 online resource (xlvii, 504 pages) :
▼b illustrations. |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
490 | 1 |
▼a IET materials, circuits and devices series ;
▼v 60 |
504 | |
▼a Includes bibliographical references and index. |
520 | |
▼a The book addresses the general issue of protecting hardware (especially DSP cores) of consumer electronics (CE) as well as data on CE, including new demands created by IoT enabled products. It also addresses the potential threats from intervention in the CE design supply chain and how these threats can be circumvented. These supply chain security solutions may include hardware watermarking, hardware fingerprinting, symmetrical IP core protection, hardware metering, computational forensic engineering for IP core protection, and various forms of hardware obfuscation. It explores and addresses many different types of security attacks that can be launched against CE products, including power and timing "side channel" attacks, as well as backdoor and brute-force attacks. Methods are discussed for defeating/blocking Trojan horse attacks as well as reverse engineering attacks. The book discusses the latest methods for active and passive IP core security of DSP cores used in CE device and protection mechanisms for the buyers of ICs and incorporated IP that includes "watermarking"and "fingerprinting"as well as structural obfuscation, functional obfuscation, hardware AES, watermarked AES, and physically unclonable functions (PUFs). It also explores the use of forensic engineering for resolving ownership issues for reusable digital signal processing (DSP) IP cores. In addition to these direct security concerns, it discusses the trade-offs of energy consumption, security and performance for CE hardware. |
588 | 0 |
▼a Online resource; title from PDF title page (IET, viewed September 20, 2019). |
590 | |
▼a Added to collection customer.56279.3 |
650 | 0 |
▼a IPSec (Computer network protocol) |
650 | 0 |
▼a Computer security. |
650 | 0 |
▼a Household electronics
▼x Security measures. |
650 | 0 |
▼a Microprocessors. |
650 | 0 |
▼a Signal processing
▼x Digital techniques. |
650 | 7 |
▼a Industrial property.
▼2 fast
▼0 (OCoLC)fst00971584 |
650 | 7 |
▼a Microprocessors.
▼2 fast
▼0 (OCoLC)fst01020008 |
650 | 7 |
▼a Signal processing
▼x Digital techniques.
▼2 fast
▼0 (OCoLC)fst01118285 |
650 | 7 |
▼a consumer electronics.
▼2 inspect |
650 | 7 |
▼a digital signal processing chips.
▼2 inspect |
650 | 7 |
▼a industrial property.
▼2 inspect |
650 | 7 |
▼a reverse engineering.
▼2 inspect |
650 | 7 |
▼a security.
▼2 inspect |
650 | 7 |
▼a supply chains.
▼2 inspect |
653 | |
▼a intellectual property |
653 | |
▼a energy consumption |
653 | |
▼a reusable digital signal processing IP cores |
653 | |
▼a ownership issues |
653 | |
▼a physically unclonable functions |
653 | |
▼a watermarked AES |
653 | |
▼a hardware AES |
653 | |
▼a functional obfuscation |
653 | |
▼a structural obfuscation |
653 | |
▼a reverse engineering attacks |
653 | |
▼a Trojan horse attacks |
653 | |
▼a brute-force attacks |
653 | |
▼a backdoor attacks |
653 | |
▼a side channel attacks |
653 | |
▼a hardware obfuscation |
653 | |
▼a computational forensic engineering |
653 | |
▼a hardware metering |
653 | |
▼a hardware fingerprinting |
653 | |
▼a hardware watermarking |
653 | |
▼a design supply chain |
653 | |
▼a hardware protection |
653 | |
▼a DSP cores |
653 | |
▼a hardware-assisted security |
653 | |
▼a IP core protection |
653 | |
▼a consumer electronics |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Mohanty, Saraju P.,
▼e author. |
830 | 0 |
▼a Materials, circuits and devices series ;
▼v 60. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2339150 |
938 | |
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL6026421 |
938 | |
▼a YBP Library Services
▼b YANK
▼n 301049520 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 2339150 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |