001445599 000__ 03130cam\a2200529Ia\4500 001445599 001__ 1445599 001445599 003__ OCoLC 001445599 005__ 20230310003840.0 001445599 006__ m\\\\\o\\d\\\\\\\\ 001445599 007__ cr\un\nnnunnun 001445599 008__ 220331s2022\\\\sz\\\\\\ob\\\\001\0\eng\d 001445599 019__ $$a1308395633$$a1308797820$$a1309027535$$a1310334722 001445599 020__ $$a9783030932749$$q(electronic bk.) 001445599 020__ $$a3030932745$$q(electronic bk.) 001445599 020__ $$z3030932737 001445599 020__ $$z9783030932732 001445599 0247_ $$a10.1007/978-3-030-93274-9$$2doi 001445599 035__ $$aSP(OCoLC)1306528450 001445599 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dUKAHL$$dOCLCQ 001445599 049__ $$aISEA 001445599 050_4 $$aTK7895.E42 001445599 08204 $$a006.2/2$$223 001445599 1001_ $$aMohammed, Shayan,$$eauthor. 001445599 24510 $$aSecurity of biochip cyberphysical systems /$$cShayan Mohammed, Sukanta Bhattacharjee, Shayan Mohammed, Sukanta Bhattacharjee, Ramesh Karri. 001445599 260__ $$aCham, Switzerland :$$bSpringer,$$c2022. 001445599 300__ $$a1 online resource 001445599 504__ $$aIncludes bibliographical references and index. 001445599 5050_ $$aIntroduction -- Threat landscape -- Architecture for Security -- Tools for Security -- Watermarking of Bio-IP -- Obfuscation of Bio-IP -- Conclusion. 001445599 506__ $$aAccess limited to authorized users. 001445599 520__ $$aThis book provides readers with a valuable guide to understanding security and the interplay of computer science, microfluidics, and biochemistry in a biochip cyberphysical system (CPS). The authors uncover new, potential threat and trust-issues to address, as this emerging technology is poised to be adapted at a large scale. Readers will learn how to secure biochip CPS by leveraging the available resources in different application contexts, as well as how to ensure intellectual property (IP) is protected against theft and counterfeits. This book enables secure biochip CPS design by helping bridge the knowledge gap at the intersection of the multi-disciplinary technology that drives biochip CPS. Provides tools for security analysis and verification: a machine learning (ML) framework; Paints the threat landscape of the biochip CPS, describing the threat models - the who, the how, and the why; Uses real case studies to describe models of tampering attack, microfluidic trojan attack. 001445599 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 12, 2022). 001445599 650_0 $$aCooperating objects (Computer systems)$$xSecurity measures. 001445599 650_0 $$aBiochips$$xSecurity measures. 001445599 650_6 $$aObjets coopérants (Systèmes informatiques)$$xSécurité$$xMesures. 001445599 650_6 $$aBiopuces$$xSécurité$$xMesures. 001445599 655_0 $$aElectronic books. 001445599 7001_ $$aBhattacharjee, Sukanta,$$eauthor. 001445599 7001_ $$aSong, Yong-Ak,$$eauthor. 001445599 7001_ $$aChakrabarty, Krishnendu,$$eauthor. 001445599 7001_ $$aKarri, Ramesh,$$eauthor. 001445599 77608 $$iPrint version: $$z3030932737$$z9783030932732$$w(OCoLC)1285917081 001445599 852__ $$bebk 001445599 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-93274-9$$zOnline Access$$91397441.1 001445599 909CO $$ooai:library.usi.edu:1445599$$pGLOBAL_SET 001445599 980__ $$aBIB 001445599 980__ $$aEBOOK 001445599 982__ $$aEbook 001445599 983__ $$aOnline 001445599 994__ $$a92$$bISE