Security Policy in System-on-Chip Designs : Specification, Implementation and Verification

個数:
電子版価格
¥9,237
  • 電子版あり

Security Policy in System-on-Chip Designs : Specification, Implementation and Verification

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 116 p.
  • 商品コード 9783319934631

Full Description

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.

Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;

Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;

Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;

Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field;

Includes discussion of current and emerging approaches for security policy verification.

Contents

Chapter1: SoC Security Policies: The State of the Practice.- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture.- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture.- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks.- Chapter5: A Move Towards a Hardware Patch.- Chapter6: SoC Security Policy Verification.- Chapter7: SoC Security Policies: Summary and Future Directions.

最近チェックした商品