Welcome to the official i-CATS University College Library system. If you are a new user, please contact our librarian for registration.

Hardware Security : (Record no. 1965)

MARC details
000 -LEADER
fixed length control field 11104nam a22005293i 4500
001 - CONTROL NUMBER
control field EBC31574313
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250825101748.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250807s2024 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031586873
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783031586866
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC31574313
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL31574313
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1442195174
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7867-7867.5
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tehranipoor, Mark.
245 10 - TITLE STATEMENT
Title Hardware Security :
Remainder of title A Look into the Future.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2024.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2024.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (538 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Preface -- Contents -- 1 Quantifiable Assurance in Hardware -- 1.1 Motivational Example and Corresponding Threat Models -- 1.2 IP-Level Security Metrics and Design Parameters -- 1.2.1 Metrics for IP Piracy and Reverse Engineering -- 1.2.2 IP-Level Parameters for IP Piracy Security Metrics -- 1.2.3 Metrics for IP-level Power Side-Channel(PSC) Attacks -- 1.2.4 IP-Level Parameters for PSC Security Metrics -- 1.2.5 Metrics for IP-Level Fault Injection Attacks -- 1.2.6 Metrics for IP-Level Malicious Hardware -- 1.2.7 IP-Level Parameters for Malicious Hardware Metrics -- 1.2.8 Metrics for IP-Level Supply Chain Attacks -- 1.3 Transition from IP to Platform -- 1.3.1 Platform-Level Parameters for IP Piracy -- 1.3.2 Platform-Level Parameters for Power Side-Channel Analysis -- 1.3.3 Platform-Level Parameters for Fault Injection -- 1.3.4 Platform-Level Parameters for Malicious Hardware -- 1.3.5 Platform-Level Parameters for Supply Chain -- 1.4 Security Measurement and Estimation: Definition -- 1.5 Showcasing Security Measurement and Estimation -- 1.5.1 Security Measurement/Estimation for IP Piracy -- 1.5.1.1 Platform-Level SAT Resiliency Measurement Flow -- 1.5.1.2 Platform-Level SAT Resiliency Estimation Flow -- 1.5.2 Security Measurement for Power Side-Channel Analysis -- 1.5.2.1 PSC Vulnerability Measurement Flow -- 1.5.2.2 PSC Vulnerability Estimation -- 1.5.2.3 Results -- 1.6 The Notion of Security Optimization -- 1.7 Challenges in Security Measurement and Estimation -- 1.7.1 Challenges for Quantifiable Platform-Level Security -- 1.7.2 Challenges in Achieving Accurate Estimation -- 1.7.3 Challenges in Security Optimization -- References -- 2 Advances in Logic Locking -- 2.1 Introduction to Logic Locking -- 2.2 Background of Models and Assumptions in Logic Locking -- 2.2.1 Basic Definitions of Logic Locking.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2.2 Models/Assumptions in Attacks on Logic Locking -- 2.3 Logic Locking: Countermeasures -- 2.3.1 Primitive Logic Locking -- 2.3.2 Point Function Logic Locking -- 2.3.2.1 Compound Logic Locking -- 2.3.3 Cyclic-Based Logic Locking -- 2.3.4 LUT/Routing-Based Logic Locking -- 2.3.5 Scan Chain Logic Locking/Blocking -- 2.3.6 FSM/Sequential Logic Locking -- 2.3.7 Behavioral Timing-Based Locking -- 2.3.7.1 Beyond-CMOS and Mixed-Signal Logic Locking -- 2.3.8 High-Level Logic Locking -- 2.3.9 eFPGA-Based IP-Level Locking -- 2.4 Logic Locking: Attacks -- 2.4.1 Oracle-Guided (OG) on Combinational Circuits -- 2.4.1.1 OG Combinational ATPG-Based Attacks -- 2.4.1.2 OG Combinational Algorithmic (SAT)-Based Attacks -- 2.4.1.3 OG Combinational Structural/Functional Attacks -- 2.4.1.4 Summary of OG Combinational Attacks -- 2.4.2 Oracle-Guided (OG) on Sequential Circuits -- 2.4.2.1 OG Sequential Unrolling-Based Attacks -- 2.4.2.2 OG/OL Sequential on FSM Locking -- 2.4.2.3 OG Sequential Scan/Leakage-BasedAttacks -- 2.4.2.4 Summary of OG Sequential Attacks -- 2.4.3 Oracle-Less (OL) Attacks -- 2.4.3.1 OL Structural Synthesis-Based Attacks -- 2.4.3.2 OL Structural ATPG-Based Attacks -- 2.4.3.3 OL Structural ML-Based Attacks -- 2.4.3.4 OL Tampering Attacks -- 2.4.3.5 OL Probing Attacks -- 2.4.3.6 Summary of Oracle-Less (OL) Attacks -- 2.5 What to Expect from Future Studies -- 2.5.1 Vulnerabilities/Requirements of Logic Locking -- 2.5.2 Possible Research Opportunities in Logic Locking -- References -- 3 Rethinking Hardware Watermark -- 3.1 Introduction -- 3.2 Existing IP Watermarking Techniques -- 3.2.1 Constraint-Based Watermarking -- 3.2.1.1 System Synthesis Level -- 3.2.1.2 Behavioral Synthesis Level -- 3.2.1.3 Logic Synthesis Level -- 3.2.1.4 Physical Synthesis Level -- 3.2.2 Digital Signal Processing Watermarking -- 3.2.3 FSM-Based Watermarking.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2.3.1 State-Based FSM Watermarking -- 3.2.3.2 Transition-Based FSM Watermarking -- 3.2.4 Test Structure-Based Watermarking -- 3.2.5 Side-Channel-Based Watermarking -- 3.3 Assessment of Existing Watermarks -- 3.3.1 General Requirements for HardwareIP Watermarking -- 3.3.2 Attack Analysis for IP Watermarking -- 3.3.2.1 Removal Attacks -- 3.3.2.2 Tampering Attacks -- 3.3.2.3 Forging Attacks -- 3.3.2.4 Reverse Engineering (RE) Attacks -- 3.3.2.5 Countermeasures -- 3.4 Comprehensive Threat Models -- 3.5 Futuristic Solutions in Watermarking -- 3.5.1 Digital Watermark -- 3.5.1.1 Access to the IP and IC -- 3.5.1.2 Access to the IC But Not the IP -- 3.5.1.3 Access to the IP But Not the IC -- 3.5.2 Universal Watermark -- 3.5.3 Active Watermark -- 3.5.4 Watermark for Trojan Detection -- 3.5.5 Side-Channel-Based Watermark -- 3.5.6 Emerging Topics in AMS Watermarking -- 3.5.7 Automatic Cost-Effective IP Watermarking -- 3.5.8 Watermark Security Assessment -- References -- 4 SoC Security Verification Using Fuzz, Penetration, and AI Testing -- 4.1 Introduction to SoC Security Verification -- 4.1.1 Security Assets in SoC -- 4.1.2 Security Policies/Properties in SoC -- 4.1.3 Security Policy/Property Languages in SoC -- 4.1.4 Pre-silicon vs. Post-silicon Verification in SoC -- 4.1.5 Adversarial Model in SoC -- 4.1.6 Verification Model in SoC -- 4.1.7 Scope of Security Verification in SoC -- 4.2 SoC Security Verification: Challenges -- 4.3 SoC Security Verification: Assumptions -- 4.4 SoC Security Verification: Flow -- 4.5 SoC Security Verification: Fuzzing -- 4.5.1 Formal Definition of Fuzz Testing -- 4.5.1.1 Black-Box Fuzzing -- 4.5.1.2 White-Box Fuzzing -- 4.5.1.3 Gray-Box Fuzzing -- 4.5.2 Fuzzing Hardware Like Software -- 4.5.2.1 Hardware to Software Abstraction -- 4.5.2.2 Prior Art HW-to-SW Fuzzing -- 4.5.2.3 Limitations and Challenges.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.5.3 Direct Fuzzing on Hardware RTL -- 4.6 SoC Security Verification: Penetration -- 4.6.1 Higher Abstraction Penetration Testing -- 4.6.2 Formal Definition of Penetration Testing -- 4.6.2.1 Black-Box Pen Testing -- 4.6.2.2 White-Box Pen Testing -- 4.6.2.3 Gray-Box Pen Testing -- 4.6.3 Penetration Testing on Hardware: Definition -- 4.6.4 Penetration Testing on Hardware: Framework -- 4.6.4.1 Binary Particle SwarmOptimization (BPSO) -- 4.6.4.2 BPSO-Based Hardware PenetrationTesting -- 4.6.4.3 Validity of Gray-Box Assumptions -- 4.7 SoC Security Verification: AI Testing -- 4.7.1 Higher Level Machine Learning -- 4.7.2 AI for Hardware Verification -- 4.7.2.1 Requirements/Workflow for Using ML in Verification -- 4.7.2.2 Challenges of ML-Based Verification -- 4.8 Future of SoC Security Verification -- 4.8.1 Fuzz Testing -- 4.8.2 Pen Testing -- 4.8.3 AI Testing -- References -- 5 Runtime SoC Security Validation -- 5.1 Introduction -- 5.2 Background of Security Vulnerabilities and Monitoring -- 5.3 ``ilities'' Needed for Security Monitoring -- 5.4 Possible Avenues of SoC Security Monitoring -- 5.4.1 Solution 1: Synthesizable Assertions -- 5.4.2 Solution 2: Coarse-Grained eFPGA-BasedMonitoring -- 5.4.3 Solution 3: Multi-application eFGPA Used for Monitoring -- 5.4.4 Solution 4: Distributed Monitoring Units + eFPGA -- 5.5 Distributed Monitoring with Centralized Checker: A Case Study -- 5.5.1 Experimental Evaluation -- 5.6 Takeaways and Future Possibilities -- References -- 6 Large Language Models for SoC Security -- 6.1 Introduction -- 6.2 SoC Security -- 6.2.1 Information Flow Tracking -- 6.2.2 Fuzzing -- 6.2.3 Penetration Testing -- 6.2.4 Concolic Testing -- 6.2.5 AI-Based Verification -- 6.3 Large Language Model -- 6.3.1 Evolution of GPT -- 6.3.2 Model Architecture -- 6.3.3 Learning Settings -- 6.3.4 Prompt Engineering -- 6.3.5 LLM for Coding Task.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.4 Interaction Between LLM and SoC Security -- 6.4.1 Capability of LLM in SoC Security -- 6.4.2 Role of Learning Setting in SoC Security -- 6.4.3 Choice of Model Architecture in SoC Security -- 6.4.4 Fidelity Check in SoC Security -- 6.4.5 LLM-Based Works on Hardware Design and Security -- 6.5 Case Studies -- 6.5.1 Case Study I: Vulnerability Insertion -- 6.5.2 Case Study II: Vulnerability Detection in RISC-V SoCs -- 6.5.3 Case Study III: Security Evaluation in FSM Design -- 6.5.3.1 Case Study III-A: Security Metric Calculation -- 6.5.3.2 Case Study III-C: Security Assessment through Open-Ended Question -- 6.5.4 Case Study IV: Countermeasure Development -- 6.6 Prospects and Challenges of LLM-Based Security Verification -- 6.6.1 Prospects in Employing LLM in SoC Security -- 6.6.2 Challenges in Employing LLM in SoC Security -- 6.7 Conclusion -- References -- 7 Power Side-Channel Evaluation in Post-quantum Cryptography -- 7.1 Introduction -- 7.2 Preliminaries -- 7.2.1 Notation -- 7.2.2 NIST Round 3 Candidates -- 7.2.3 Lattice-Based KEM/Encryption Schemes -- 7.2.3.1 SABER -- 7.2.3.2 CRYSTALS-KYBER -- 7.3 Prevailing Side-Channel Attacks -- 7.3.1 Algorithmic-Level Attacks -- 7.3.2 Implementation-Level Attacks -- 7.3.3 AI-Based Side-Channel Attacks -- 7.4 PQC Side-Channel Evaluation Platform (SEP) -- 7.4.1 Pre-silicon Side-Channel Leakage Assessment -- 7.4.1.1 RTL-PAT -- 7.4.1.2 GL-PAT -- 7.4.1.3 PL-PAT -- 7.4.2 Post-silicon Side-Channel Leakage Assessment -- 7.4.2.1 Leakage Assessment -- 7.4.3 AI-Based SCA Attacks -- 7.4.3.1 Roadmap for AI-based Side-Channel Analysis -- 7.4.3.2 DL-Based Framework Using Signal Decomposition -- 7.4.3.3 Training Scheme -- 7.5 Experimental Results -- 7.5.1 Pre-silicon Side-Channel Analysis Results -- 7.5.2 Post-silicon Side-Channel Analysis Results -- 7.5.2.1 SW Implementations -- 7.5.2.2 HW Implementations.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7.5.2.3 AI-Based SCA Attacks.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2025. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zamiri Azar, Kimia.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Asadizanjani, Navid.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rahman, Fahim.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mardani Kamali, Hadi.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Farahmandi, Farimah.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Tehranipoor, Mark
Title Hardware Security
Place, publisher, and date of publication Cham : Springer,c2024
International Standard Book Number 9783031586866
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral-proquest-com.mlisicats.remotexs.co/lib/ppks/detail.action?docID=31574313&query=9783031586873">https://ebookcentral-proquest-com.mlisicats.remotexs.co/lib/ppks/detail.action?docID=31574313&query=9783031586873</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type E-Book

No items available.

Copyright CITM & Maznah Library, i-CATS University College 2025. All Rights Reserved

Powered by Koha