Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Sengupta, Anirban (Computer scientist)

Title Frontiers in Securing IP Cores : Forensic Detective Control and Obfuscation Techniques.

Publication Info. Stevenage : Institution of Engineering & Technology, 2020.

Item Status

Description 1 online resource (365 pages).
Physical Medium polychrome
Description text file
Series Materials, Circuits and Devices Ser.
Materials, Circuits and Devices Ser.
Note Description based upon print version of record.
Contents Intro -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- About the author -- Foreword of the IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- Foreword for IET book 'Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques' -- List of acronyms -- 1 Introduction to hardware (IP) security: forensic detective control and obfuscation of digital signal processing (DSP) cores -- 1.1 Hardware security: an introduction -- 1.2 Hardware security of DSP cores: using high-level synthesis (HLS) framework or ESL
1.3 Security: energy trade-off in high-level synthesis for hardware security of DSP cores -- 1.4 Design space exploration systems used in HLS: utility in performing energy or area-security trade-offs -- 1.5 Comparative perspective of different security techniques used for DSP cores -- 1.6 Conclusion -- 1.7 Questions and exercises -- References -- 2 Forensic detective control using hardware steganography for IP core protection -- 2.1 Introduction -- 2.2 Threat model -- 2.3 Selected contemporary approaches -- 2.4 IP core steganography model
2.5 Forensic detective control using hardware (IP core) steganography -- 2.6 Design process of a steganography-embedded IP core: a case study on 8-point DCT -- 2.7 Security features of hardware steganography -- 2.8 Analysis of case studies -- 2.9 Conclusion -- 2.10 Questions and Exercises -- References -- 3 Forensic detective control using a digital signature-based watermark for IP core protection -- 3.1 Introduction -- 3.2 Threat models of an IP core -- 3.3 Selected contemporary approaches -- 3.4 Security modules employed in digital signature-based watermarks
3.5 Forensic detective control using a digital signature-based watermark -- 3.6 Case study on 8-point DCT used in image compression -- 3.7 Desirable properties of a digital signature-based watermark -- 3.8 Threat scenarios and their countermeasures using digital signature-based watermarks -- 3.9 Analysis based on case studies -- 3.10 Conclusion -- 3.11 Questions and exercises -- References -- 4 Protection of fault-secured IP cores using digital signature-based watermarks -- 4.1 Introduction -- 4.2 Threat model -- 4.3 Selected contemporary approaches
4.4 Forensic detective control of fault-secured IP cores using digital signature-based watermarks -- 4.5 Case study on a fault-secured, finite impulse response (FIR) filter -- 4.6 Analysis of case studies -- DSP cores -- 4.7 Conclusion -- 4.8 Questions and exercises -- References -- 5 Multi-level watermark for IP protection -- 5.1 Introduction -- 5.2 Discussion on selected approaches -- 5.3 Salient features and advantages of multi-level watermarks -- 5.4 Embedding signatures as secret marks -- 5.5 Design process of a multi-level watermarked IP core
Note 5.6 Signature detection in a multi-level watermarked IP core.
Summary This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Cryptography.
Cryptography.
Industrial property.
Industrial property.
Microprocessors.
Microprocessors.
Signal processing -- Digital techniques.
Signal processing -- Digital techniques.
Genre/Form Electronic books.
Other Form: Print version: Sengupta, Anirban Frontiers in Securing IP Cores : Forensic Detective Control and Obfuscation Techniques Stevenage : Institution of Engineering & Technology,c2020 9781839530319
ISBN 1839530324
9781839530326 (electronic book)
1839530316
9781839530319