TY - GEN N2 - This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security. DO - 10.1007/978-3-319-50057-7 DO - doi AB - This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security. T1 - Fundamentals of IP and SoC security :design, verification, and debug / AU - Bhunia, Swarup, AU - Ray, Sandip, AU - Sur-Kolay, Susmita, CN - QA76.9.A25 ID - 806733 KW - Computer security. KW - Data encryption (Computer science) KW - Internet SN - 9783319500577 SN - 3319500570 TI - Fundamentals of IP and SoC security :design, verification, and debug / LK - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-50057-7 UR - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-50057-7 ER -