000806733 000__ 06132cam\a2200541Ii\4500 000806733 001__ 806733 000806733 005__ 20230306143833.0 000806733 006__ m\\\\\o\\d\\\\\\\\ 000806733 007__ cr\cn\nnnunnun 000806733 008__ 170126s2017\\\\sz\\\\\\o\\\\\000\0\eng\d 000806733 019__ $$a970610481$$a970798266$$a974650238$$a981113608$$a981774496$$a1005807237$$a1011794916 000806733 020__ $$a9783319500577$$q(electronic book) 000806733 020__ $$a3319500570$$q(electronic book) 000806733 020__ $$z9783319500553 000806733 020__ $$z3319500554 000806733 0247_ $$a10.1007/978-3-319-50057-7$$2doi 000806733 035__ $$aSP(OCoLC)ocn970041832 000806733 035__ $$aSP(OCoLC)970041832$$z(OCoLC)970610481$$z(OCoLC)970798266$$z(OCoLC)974650238$$z(OCoLC)981113608$$z(OCoLC)981774496$$z(OCoLC)1005807237$$z(OCoLC)1011794916 000806733 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dEBLCP$$dGW5XE$$dN$T$$dYDX$$dOCLCQ$$dIDEBK$$dOCLCF$$dCOO$$dUPM$$dCNCGM$$dVT2$$dUWO$$dJBG$$dIAD$$dICW$$dICN$$dOCLCQ$$dOCLCA$$dUAB 000806733 049__ $$aISEA 000806733 050_4 $$aQA76.9.A25 000806733 08204 $$a005.8$$223 000806733 24500 $$aFundamentals of IP and SoC security :$$bdesign, verification, and debug /$$cSwarup Bhunia, Sandip Ray, Susmita Sur-Kolay, editors. 000806733 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2017] 000806733 300__ $$a1 online resource 000806733 336__ $$atext$$btxt$$2rdacontent 000806733 337__ $$acomputer$$bc$$2rdamedia 000806733 338__ $$aonline resource$$bcr$$2rdacarrier 000806733 347__ $$atext file$$bPDF$$2rda 000806733 5050_ $$a1 The Landscape of SoC and IP Security; 1.1 Introduction; 1.2 SoC Design Supply Chain and Security Assets; 1.3 The Challenge of Design Complexity; 1.4 State of Security Design and Validation: Research and Practice; 1.5 The Book; References; 2 Security Validation in Modern SoC Designs; 2.1 Security Needs in Modern SoC Designs; 2.2 Supply Chain Security Threats; 2.3 Security Policies: Requirements from Design; 2.4 Adversaries in SoC Security; 2.5 IP-Level Trust Validation; 2.6 Security Along SoC Design Life Cycle; 2.7 Security Validation Activities; 2.8 Validation Technologies. 000806733 5058_ $$a2.9 SummaryReferences; 3 SoC Security and Debug; 3.1 Introduction; 3.2 SoC Debug Architecture; 3.2.1 Debug Interface; 3.2.2 On-Chip DfD Instrumentation; 3.3 Security Concerns and Hazards; 3.3.1 SoC Security Requirements; 3.3.2 DfD Induced Security Hazards; 3.4 Protection Against Hazards Induced by Debugging; 3.4.1 Trade-Off Between Security and Debug; 3.4.2 Authentication-Based Debug Access Control; 3.4.3 Limitations and Challenges; 3.5 Summary; References; 4 IP Trust: The Problem and Design/Validation-Based Solution; 4.1 Introduction; 4.2 Design for IP Protection; 4.2.1 Threat Model. 000806733 5058_ $$a4.2.2 Combinational Logic Locking/Encryption4.2.3 Finite State Machine Locking/Encryption; 4.2.4 Protection Methods for FPGA IP; 4.3 IP Certification; 4.4 Conclusion; References; 5 Security of Crypto IP Core: Issues and Countermeasures; 5.1 Introduction; 5.1.1 Implementation: An Issue for Security; 5.1.2 Side Channels; 5.2 Power Analysis of Cryptographic Cores; 5.2.1 Simple Power Attack (SPA); 5.2.2 Differential Power Attacks; 5.2.3 Template Attack; 5.3 Countermeasures Against Power Analysis; 5.3.1 t-Private Circuit; 5.3.2 Masking; 5.3.3 DRECON: DPA Resistant Encryption by Construction. 000806733 5058_ $$a5.3.4 Evaluation of Side Channel Leakage for a Crypto Core5.4 Fault Attack Resistant Crypto Cores; 5.4.1 General Principle of DFA of Block Ciphers; 5.4.2 Fault Analysis of AES; 5.4.3 Experimental Results on Fault Models; 5.4.4 Proposed DFA on AES-192 Key Schedule ; 5.4.5 Countermeasures Against DFA; 5.5 Testing and Validation of Crypto Cores; 5.5.1 Working Principle of Scan-Chain-Attacks on Block Ciphers; 5.6 Conclusions; References; 6 PUF-Based Authentication; 6.1 Introduction; 6.2 Information Security and Cryptography; 6.3 Cryptographic Primitives for Authentication Protocols. 000806733 5058_ $$a6.3.1 Random Number Generation6.3.2 Cryptographic Hash Functions; 6.3.3 Secure Sketches and Fuzzy Extractors; 6.3.4 Statistical Metrics; 6.4 Traditional, Software-Oriented Authentication; 6.4.1 Entity Authentication; 6.5 Physical Unclonable Functions (PUFs); 6.5.1 PUF-Based Authentication; 6.5.2 Strong Versus Weak PUFs; 6.5.3 The Arbiter PUF; 6.5.4 Hardware-Embedded Delay PUF (HELP); Clock Strobing; PN Processing; Temperature-Voltage (TV) Compensation; Bit Generation Algorithm; Entropy Analysis; Statistical Analysis of the Bitstrings; Security Property Analysis. 000806733 506__ $$aAccess limited to authorized users. 000806733 520__ $$aThis book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security. 000806733 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 6, 2017). 000806733 650_0 $$aComputer security. 000806733 650_0 $$aData encryption (Computer science) 000806733 650_0 $$aInternet$$xSecurity measures. 000806733 7001_ $$aBhunia, Swarup,$$eeditor. 000806733 7001_ $$aRay, Sandip,$$eeditor. 000806733 7001_ $$aSur-Kolay, Susmita,$$eeditor. 000806733 77608 $$iPrint version:$$tFundamentals of Ip and Soc Security.$$dSpringer Verlag 2017$$z9783319500553$$w(OCoLC)962231136 000806733 852__ $$bebk 000806733 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-50057-7$$zOnline Access$$91397441.1 000806733 909CO $$ooai:library.usi.edu:806733$$pGLOBAL_SET 000806733 980__ $$aEBOOK 000806733 980__ $$aBIB 000806733 982__ $$aEbook 000806733 983__ $$aOnline 000806733 994__ $$a92$$bISE