Security of biochip cyberphysical systems / Shayan Mohammed, Sukanta Bhattacharjee, Shayan Mohammed, Sukanta Bhattacharjee, Ramesh Karri.
2022
TK7895.E42
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security of biochip cyberphysical systems / Shayan Mohammed, Sukanta Bhattacharjee, Shayan Mohammed, Sukanta Bhattacharjee, Ramesh Karri.
Author
ISBN
9783030932749 (electronic bk.)
3030932745 (electronic bk.)
3030932737
9783030932732
3030932745 (electronic bk.)
3030932737
9783030932732
Publication Details
Cham, Switzerland : Springer, 2022.
Language
English
Description
1 online resource
Item Number
10.1007/978-3-030-93274-9 doi
Call Number
TK7895.E42
Dewey Decimal Classification
006.2/2
Summary
This book provides readers with a valuable guide to understanding security and the interplay of computer science, microfluidics, and biochemistry in a biochip cyberphysical system (CPS). The authors uncover new, potential threat and trust-issues to address, as this emerging technology is poised to be adapted at a large scale. Readers will learn how to secure biochip CPS by leveraging the available resources in different application contexts, as well as how to ensure intellectual property (IP) is protected against theft and counterfeits. This book enables secure biochip CPS design by helping bridge the knowledge gap at the intersection of the multi-disciplinary technology that drives biochip CPS. Provides tools for security analysis and verification: a machine learning (ML) framework; Paints the threat landscape of the biochip CPS, describing the threat models - the who, the how, and the why; Uses real case studies to describe models of tampering attack, microfluidic trojan attack.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed April 12, 2022).
Added Author
Available in Other Form
Print version: 9783030932732
Linked Resources
Record Appears in
Table of Contents
Introduction
Threat landscape
Architecture for Security
Tools for Security
Watermarking of Bio-IP
Obfuscation of Bio-IP
Conclusion.
Threat landscape
Architecture for Security
Tools for Security
Watermarking of Bio-IP
Obfuscation of Bio-IP
Conclusion.