Security Policy in System-on-Chip Designs
Autor: | Basak, Abhishek Bhunia, Swarup Ray, Sandip |
---|---|
EAN: | 9783319934631 |
Auflage: | 001 |
Sachgruppe: | Technik |
Sprache: | Englisch |
Seitenzahl: | 128 |
Produktart: | Gebunden |
Veröffentlichungsdatum: | 20.10.2018 |
Untertitel: | Specification, Implementation and Verification |
Schlagworte: | Architektur (EDV) Bauelement (elektronisch) - Baustein (elektronisch) Elektronik / Bauelemente Elektronik / Mikroelektronik Elektronik / Schaltung Mikroelektronik Rechnerarchitektur Schaltung - Grundschaltung Standardschaltung |
53,49 €*
Die Verfügbarkeit wird nach ihrer Bestellung bei uns geprüft.
Bücher sind in der Regel innerhalb von 1-2 Werktagen abholbereit.
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs ¿ current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for ¿hardware patching¿, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to ¿hardware patching¿, i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.