Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Security Policy in System-on-Chip Designs : Specification, Implementation and Verification / by Sandip Ray, Abhishek Basak, Swarup Bhunia

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: SpringerLink BücherVerlag: Cham : Springer International Publishing, 2019Beschreibung: Online-Ressource (IX, 116 p. 30 illus. in color, online resource)ISBN:
  • 9783319934648
Schlagwörter: Andere physische Formen: 9783319934631 | Erscheint auch als: 978-3-319-93463-1 Druck-AusgabeDDC-Klassifikation:
  • 621.3815
LOC-Klassifikation:
  • TK7888.4
DOI: DOI: 10.1007/978-3-319-93464-8Online-Ressourcen: Zusammenfassung: This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verificationZusammenfassung: Chapter1: SoC Security Policies: The State of the Practice -- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture -- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture -- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks -- Chapter5: A Move Towards a Hardware Patch -- Chapter6: SoC Security Policy Verification -- Chapter7: SoC Security Policies: Summary and Future DirectionsPPN: PPN: 1036400034Package identifier: Produktsigel: ZDB-2-ENG | ZDB-2-SEB | ZDB-2-SXE
Dieser Titel hat keine Exemplare