000 04465nam a22005415i 4500
001 978-3-030-69131-8
003 DE-He213
005 20220801220327.0
007 cr nn 008mamaa
008 210503s2021 sz | s |||| 0|eng d
020 _a9783030691318
_9978-3-030-69131-8
024 7 _a10.1007/978-3-030-69131-8
_2doi
050 4 _aTK7895.E42
072 7 _aUKM
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aUKM
_2thema
082 0 4 _a006.22
_223
245 1 0 _aNetwork-on-Chip Security and Privacy
_h[electronic resource] /
_cedited by Prabhat Mishra, Subodha Charles.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXII, 496 p. 213 illus., 199 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction to System-on-Chip Design using Network-on-Chip -- Network-on-Chip Security Challenges due to Supply Chain -- Characterizing and Optimizing Performance in NoC Architectures -- Characterizing and Optimizing Energy in NoC Architectures -- Modeling NoC in Architectural Simulators -- Eavesdropping Attacks -- Data Integrity Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks -- Emerging Security Vulnerabilities in NoC-based SoCs -- Lightweight Encryption and authentication in NoC-based SoCs -- Trust-aware Routing in NoC-based SoCs -- Route and Data Randomization in NoC-based SoCs -- Mitigating Side-Channel Attacks in NoC-based SoCs -- Real-time Detection and Localization of DoS attacks -- Digital Watermarking for Detecting Malicious IP Cores -- Authorization for NoC Resource Accesses -- Formal Verification of NoC Security Properties -- NoC Trust Verification using Security Assertions -- Securing Optical/Photonic NoC -- Securing Wireless NoC -- Securing 2.5 and 3D NoC -- Future of Trustworthy On-Chip Communication -- Conclusions and Future Directions. .
520 _aThis book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems. Provides a comprehensive overview of NoC security vulnerabilities for diverse on-chip communication architectures, including bus, mesh, ring, star, and hybrid network topologies; Describes state-of-the-art security solutions for defending against a wide spectrum of attacks, including malicious implants (e.g., hardware Trojans), eavesdropping, information leakage, spoofing, denial-of-service, and erroneous execution; Covers a wide variety of NoC attacks and effective countermeasures for diverse communication technologies, including electrical, optical (photonic) and wireless NoCs; Presents lightweight static (design-for-trust), as well as dynamic (runtime) security solutions; Enables security validation using an effective combination of formal methods, assertion-based validation, side-channel analysis, and machine learning; Discusses trade-offs between on-chip communication security and energy-efficient implementation in resource constrained embedded systems and IoT devices.
650 0 _aEmbedded computer systems.
_97792
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_949668
650 0 _aComputer architecture.
_93513
650 1 4 _aEmbedded Systems.
_932486
650 2 4 _aElectronic Circuits and Systems.
_949669
650 2 4 _aProcessor Architectures.
_949670
700 1 _aMishra, Prabhat.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949671
700 1 _aCharles, Subodha.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949672
710 2 _aSpringerLink (Online service)
_949673
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030691301
776 0 8 _iPrinted edition:
_z9783030691325
776 0 8 _iPrinted edition:
_z9783030691332
856 4 0 _uhttps://doi.org/10.1007/978-3-030-69131-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78449
_d78449