Description |
1 online resource (365 pages). |
Physical Medium |
polychrome |
Description |
text file |
Series |
Materials, Circuits and Devices Ser.
|
|
Materials, Circuits and Devices Ser.
|
Note |
Description based upon print version of record. |
Contents |
Intro -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- About the author -- Foreword of the IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- Foreword for IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- List of acronyms -- 1 Introduction to hardware (IP) security: forensic detective control and obfuscation of digital signal processing (DSP) cores -- 1.1 Hardware security: an introduction -- 1.2 Hardware security of DSP cores: using high-level synthesis (HLS) framework or ESL |
|
1.3 Security: energy trade-off in high-level synthesis for hardware security of DSP cores -- 1.4 Design space exploration systems used in HLS: utility in performing energy or area-security trade-offs -- 1.5 Comparative perspective of different security techniques used for DSP cores -- 1.6 Conclusion -- 1.7 Questions and exercises -- References -- 2 Forensic detective control using hardware steganography for IP core protection -- 2.1 Introduction -- 2.2 Threat model -- 2.3 Selected contemporary approaches -- 2.4 IP core steganography model |
|
2.5 Forensic detective control using hardware (IP core) steganography -- 2.6 Design process of a steganography-embedded IP core: a case study on 8-point DCT -- 2.7 Security features of hardware steganography -- 2.8 Analysis of case studies -- 2.9 Conclusion -- 2.10 Questions and Exercises -- References -- 3 Forensic detective control using a digital signature-based watermark for IP core protection -- 3.1 Introduction -- 3.2 Threat models of an IP core -- 3.3 Selected contemporary approaches -- 3.4 Security modules employed in digital signature-based watermarks |
|
3.5 Forensic detective control using a digital signature-based watermark -- 3.6 Case study on 8-point DCT used in image compression -- 3.7 Desirable properties of a digital signature-based watermark -- 3.8 Threat scenarios and their countermeasures using digital signature-based watermarks -- 3.9 Analysis based on case studies -- 3.10 Conclusion -- 3.11 Questions and exercises -- References -- 4 Protection of fault-secured IP cores using digital signature-based watermarks -- 4.1 Introduction -- 4.2 Threat model -- 4.3 Selected contemporary approaches |
|
4.4 Forensic detective control of fault-secured IP cores using digital signature-based watermarks -- 4.5 Case study on a fault-secured, finite impulse response (FIR) filter -- 4.6 Analysis of case studies -- DSP cores -- 4.7 Conclusion -- 4.8 Questions and exercises -- References -- 5 Multi-level watermark for IP protection -- 5.1 Introduction -- 5.2 Discussion on selected approaches -- 5.3 Salient features and advantages of multi-level watermarks -- 5.4 Embedding signatures as secret marks -- 5.5 Design process of a multi-level watermarked IP core |
Note |
5.6 Signature detection in a multi-level watermarked IP core. |
Summary |
This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Cryptography.
|
|
Cryptography. |
|
Industrial property.
|
|
Industrial property. |
|
Microprocessors.
|
|
Microprocessors. |
|
Signal processing -- Digital techniques.
|
|
Signal processing -- Digital techniques. |
Genre/Form |
Electronic books.
|
Other Form: |
Print version: Sengupta, Anirban Frontiers in Securing IP Cores : Forensic Detective Control and Obfuscation Techniques Stevenage : Institution of Engineering & Technology,c2020 9781839530319 |
ISBN |
1839530324 |
|
9781839530326 (electronic book) |
|
1839530316 |
|
9781839530319 |
|