Description

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.

  • Provides a single-source reference to behavioral synthesis for hardware security;
  • Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;
  • Includes behavioral synthesis techniques for intellectual property protection.

Behavioral Synthesis for Hardware Security

Product form

£109.99

Includes FREE delivery
Usually despatched within days
Hardback by Srinivas Katkoori , Sheikh Ariful Islam

1 in stock

Short Description:

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart... Read more

    Publisher: Springer Nature Switzerland AG
    Publication Date: 09/02/2022
    ISBN13: 9783030788407, 978-3030788407
    ISBN10: 3030788407

    Number of Pages: 398

    Non Fiction , Technology, Engineering & Agriculture , Education

    Description

    This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.

    • Provides a single-source reference to behavioral synthesis for hardware security;
    • Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;
    • Includes behavioral synthesis techniques for intellectual property protection.

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account