High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (Materials, Circuits and Devices)

個数:

High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (Materials, Circuits and Devices)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 327 p.
  • 言語 ENG
  • 商品コード 9781837241170
  • DDC分類 005.8

Full Description

High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents state-of-the art high-level synthesis methodologies for hardware security and trust, including IP protection through synthesis-based watermarking and structural obfuscation.

All modern electronic gadgets have complex system-on-chips (SoCs) that rely heavily on data intensive application specific processors, for digital signal processing (DSP), machine learning, and image processing applications. These data-intensive cores, in the form of intellectual property (IP), form an integral part of various modern equipment and consumer applications, such as smart phones, smart watches, and tablets.

High level synthesis (HLS) frameworks play a pivotal role in designing these application specific processors. However, the design of such processors can be exposed to several trust issues and hardware security threats, such as IP piracy, fraud IP ownership, and reverse engineering.

Written by an expert author, this book is a source of information for readers on HLS solutions for hardware security. It covers topics such as HLS-based watermarking using retinal biometrics, HLS-based structural obfuscation, and detective countermeasure against HLS-based hardware Trojan attacks.

This book is a useful resource for researchers, graduate students, and practising engineers working in electronics and chip design.

Contents

Chapter 1: Introduction to hardware security and trust and high-level synthesis
Chapter 2: High-level synthesis-based watermarking using protein molecular biometric with facial biometric encryption
Chapter 3: High-level synthesis-based watermarking using retinal biometrics
Chapter 4: HLS-based mathematical watermarks for hardware security and trust
Chapter 5: High-level synthesis-based watermarking using multimodal biometric
Chapter 6: High-level synthesis-based watermarking using crypto-chain signature framework
Chapter 7: HLS-based fingerprinting
Chapter 8: Hardware obfuscation-high level synthesis-based structural obfuscation for hardware security and trust
Chapter 9: Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis
Chapter 10: Fundamentals on HLS-based hardware Trojan
Chapter 11: Hardware Trojans - detective countermeasure against HLS-based hardware Trojan attack
Chapter 12: Conclusion

最近チェックした商品