Secure System Design and Trustable Computing by Chip-Hong ChangSecure System Design and Trustable Computing by Chip-Hong Chang

Secure System Design and Trustable Computing

byChip-Hong ChangEditorMiodrag Potkonjak

Hardcover | September 30, 2015

Pricing and Purchase Info

$205.29 online 
$248.50 list price save 17%
Earn 1,026 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society's microelectronic-supported infrastructures.

Chip-Hong Chang received his Ph.D. degree from Nanyang Technological University (NTU) of Singapore in 1998. He served as a Technical Consultant in industry prior to joining the School of Electrical and Electronic Engineering (EEE) of NTU in 1999, where he is currently an Associate Professor. He held joint appointments with the universi...
Loading
Title:Secure System Design and Trustable ComputingFormat:HardcoverDimensions:537 pagesPublished:September 30, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319149709

ISBN - 13:9783319149707

Look for similar items by category:

Reviews

Table of Contents

Part I : Hardware Security Primitives.- Disorder-Based Security Hardware: An Overview.- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography.- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications.- Residue number systems in cryptography: design, challenges, robustness.- Fault Attacks on AES and their Countermeasures.- Hardware Counterfeiting and Integrity Protection.- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits.- Hardware Trojan Detection in Analog/RF Integrated CircuitsFPGAs.- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks.- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques.- Hardware IP Watermarking and Fingerprinting.- IP Protection of FPGA Cores through a Novel Public/Secret-key Encryption Mechanism.- Secure Licensing of IP Cores on SRAM-based FPGAs.- Part III: Trust in Softwares, Networks and Services.- Heterogeneous Architectures: Malware and Countermeasures.- Trusted, Heterogeneous, and Autonomic Mobile Cloud.- Infiltrating Social Network Accounts: Attacks and Defenses.- An Economical, Deployable and Secure Architecture for the Initial Deployment Stage of Vehicular Ad-Hoc Network.- Deception-based Survivability.