LEADER 00000cam a2200673Mu 4500 001 on1223089197 003 OCoLC 005 20211008041809.0 006 m o d 007 cr cnu---unuuu 008 201121s2020 xx o ||| 0 eng d 019 1184679172 020 1839530324 020 9781839530326|q(electronic book) 020 |z1839530316 020 |z9781839530319 035 (OCoLC)1223089197|z(OCoLC)1184679172 040 EBLCP|beng|cEBLCP|dYDX|dUKAHL|dN$T|dOCLCF|dOCLCO 049 RIDW 050 4 QA268 082 04 621.395 090 QA268 100 1 Sengupta, Anirban|c(Computer scientist)|0https:// id.loc.gov/authorities/names/no2020034427 245 10 Frontiers in Securing IP Cores :|bForensic Detective Control and Obfuscation Techniques. 264 1 Stevenage :|bInstitution of Engineering & Technology, |c2020. 300 1 online resource (365 pages). 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 490 1 Materials, Circuits and Devices Ser. 500 Description based upon print version of record. 500 5.6 Signature detection in a multi-level watermarked IP core. 505 0 Intro -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- About the author -- Foreword of the IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- Foreword for IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- List of acronyms -- 1 Introduction to hardware (IP) security: forensic detective control and obfuscation of digital signal processing (DSP) cores -- 1.1 Hardware security: an introduction -- 1.2 Hardware security of DSP cores: using high-level synthesis (HLS) framework or ESL 505 8 1.3 Security: energy trade-off in high-level synthesis for hardware security of DSP cores -- 1.4 Design space exploration systems used in HLS: utility in performing energy or area-security trade-offs -- 1.5 Comparative perspective of different security techniques used for DSP cores -- 1.6 Conclusion -- 1.7 Questions and exercises -- References -- 2 Forensic detective control using hardware steganography for IP core protection -- 2.1 Introduction - - 2.2 Threat model -- 2.3 Selected contemporary approaches -- 2.4 IP core steganography model 505 8 2.5 Forensic detective control using hardware (IP core) steganography -- 2.6 Design process of a steganography- embedded IP core: a case study on 8-point DCT -- 2.7 Security features of hardware steganography -- 2.8 Analysis of case studies -- 2.9 Conclusion -- 2.10 Questions and Exercises -- References -- 3 Forensic detective control using a digital signature-based watermark for IP core protection -- 3.1 Introduction -- 3.2 Threat models of an IP core -- 3.3 Selected contemporary approaches -- 3.4 Security modules employed in digital signature-based watermarks 505 8 3.5 Forensic detective control using a digital signature- based watermark -- 3.6 Case study on 8-point DCT used in image compression -- 3.7 Desirable properties of a digital signature-based watermark -- 3.8 Threat scenarios and their countermeasures using digital signature-based watermarks -- 3.9 Analysis based on case studies -- 3.10 Conclusion -- 3.11 Questions and exercises -- References - - 4 Protection of fault-secured IP cores using digital signature-based watermarks -- 4.1 Introduction -- 4.2 Threat model -- 4.3 Selected contemporary approaches 505 8 4.4 Forensic detective control of fault-secured IP cores using digital signature-based watermarks -- 4.5 Case study on a fault-secured, finite impulse response (FIR) filter - - 4.6 Analysis of case studies -- DSP cores -- 4.7 Conclusion -- 4.8 Questions and exercises -- References -- 5 Multi-level watermark for IP protection -- 5.1 Introduction -- 5.2 Discussion on selected approaches -- 5.3 Salient features and advantages of multi-level watermarks -- 5.4 Embedding signatures as secret marks -- 5.5 Design process of a multi-level watermarked IP core 520 This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Cryptography.|0https://id.loc.gov/authorities/subjects/ sh85034453 650 0 Industrial property.|0https://id.loc.gov/authorities/ subjects/sh85065922 650 0 Microprocessors.|0https://id.loc.gov/authorities/subjects/ sh85084898 650 0 Signal processing|xDigital techniques.|0https://id.loc.gov /authorities/subjects/sh85122398 650 7 Cryptography.|2fast|0https://id.worldcat.org/fast/884552 650 7 Industrial property.|2fast|0https://id.worldcat.org/fast/ 971584 650 7 Microprocessors.|2fast|0https://id.worldcat.org/fast/ 1020008 650 7 Signal processing|xDigital techniques.|2fast|0https:// id.worldcat.org/fast/1118285 655 4 Electronic books. 776 08 |iPrint version:|aSengupta, Anirban|tFrontiers in Securing IP Cores : Forensic Detective Control and Obfuscation Techniques|dStevenage : Institution of Engineering & Technology,c2020|z9781839530319 830 0 Materials, Circuits and Devices Ser. 856 40 |uhttps://rider.idm.oclc.org/login?url=https:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=2569705|zOnline ebook via EBSCO. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading the EBSCO version of this ebook|uhttp://guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20211213|cEBSCO|tEBSCOebooksacademic NEW Oct-Nov 5018 |lridw 994 92|bRID