- ホーム
- > 洋書
- > 英文書
- > Science / Mathematics
Full Description
IP Core Protection and Hardware-Assisted Security for Consumer Electronics presents established and novel solutions for security and protection problems related to IP cores (especially those based on DSP/multimedia applications) in consumer electronics. The topic is important to researchers in various areas of specialization, encompassing overlapping topics such as EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and application specific processor/hardware accelerator design.
The book begins by introducing the concepts of security, privacy and IP protection in information systems. Later chapters focus specifically on hardware-assisted IP security in consumer electronics, with coverage including essential topics such as hardware Trojan security, robust watermarking, fingerprinting, structural and functional obfuscation, encryption, IoT security, forensic engineering based protection, JPEG obfuscation design, hardware assisted media protection, PUF and side-channel attack resistance.
Contents
Chapter 1: Introduction to IP core protection and hardware-assisted security of consumer electronics
Chapter 2: Security in consumer electronics and internet of things (IoT)
Chapter 3: Trojan security aware DSP IP core and integrated circuits
Chapter 4: IP core and integrated circuit protection using robust watermarking
Chapter 5: Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking
Chapter 6: Computational forensic engineering for resolving ownership conflict of DSP IP core
Chapter 7: Structural obfuscation of DSP cores used in CE devices
Chapter 8: Functional obfuscation of DSP cores used in CE devices
Chapter 9: Obfuscation of JPEG CODEC IP core for CE devices
Chapter 10: Advanced encryption standard (AES) and its hardware watermarking for ownership protection
Chapter 11: Hardware approaches for media and information protection and authentication
Chapter 12: Physical unclonable functions (PUFs)