Vtome.ru - электронная библиотека

Behavioral Synthesis for Hardware Security

  • Добавил: literator
  • Дата: 10-02-2022, 05:28
  • Комментариев: 0
Behavioral Synthesis for Hardware SecurityНазвание: Behavioral Synthesis for Hardware Security
Автор: Srinivas Katkoori, Sheikh Ariful Islam
Издательство: Springer
Год: 2022
Страниц: 397
Язык: английский
Формат: pdf (true)
Размер: 12.3 MB

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.

Today, behavioral synthesis tools are widely used in industry to routinely design billion-transistor complex integrated circuits. While there are several knobs available in these tools for area, power, and performance optimization, none exist for automatically incorporating security in a design. The primary reason for this state of affairs is that the problem of hardware security is not yet well understood. The problem inherently is a difficult problem, for example, there is no metric to measure the level of security, unlike those available for area, power, and performance.

There is a large and active community of hardware security researchers addressing the secure design problem at lower levels of design abstraction, namely at physical and gate levels. Relatively speaking, the number of research groups working at higher levels of abstractions is low. The main reason is that the knowledge base built at the lower levels is quintessential to address the problem reliably at the higher levels (as was the case with the area, power, and performance optimization).

This edited book provides a snapshot of the ongoing hardware security research at the register-transfer level and above. The intended audience are the academic researchers actively conducting research in the area as well as those who intend to work in this area. Further, the designers in the semiconductor industry can benefit by understanding how one could address the problem at higher levels. The book can also be used in undergraduate or graduate advanced hardware security elective.

Provides a single-source reference to behavioral synthesis for hardware security;
Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;
Includes behavioral synthesis techniques for intellectual property protection.

Contents:


Скачать Behavioral Synthesis for Hardware Security



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!










ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.