Advertisement

Fundamentals of IP and SoC Security

Design, Verification, and Debug

  • Swarup Bhunia
  • Sandip Ray
  • Susmita Sur-Kolay

Table of contents

  1. Front Matter
    Pages i-vi
  2. Sandip Ray, Susmita Sur-Kolay, Swarup Bhunia
    Pages 1-8
  3. Sandip Ray, Swarup Bhunia, Prabhat Mishra
    Pages 9-27
  4. Wen Chen, Jayanta Bhadra, Li-C. Wang
    Pages 29-48
  5. Raj Gautam Dutta, Xiaolong Guo, Yier Jin
    Pages 49-65
  6. Debapriya Basu Roy, Debdeep Mukhopadhyay
    Pages 67-114
  7. Jim Plusquellic
    Pages 115-166
  8. Debasri Saha, Susmita Sur-Kolay
    Pages 167-197
  9. Ramesh Karri, Ozgur Sinanoglu, Jeyavijayan Rajendran
    Pages 199-222
  10. Nahid Farhady Galathy, Bilgiday Yuce, Patrick Schaumont
    Pages 223-245
  11. Hassan Salmani
    Pages 247-276
  12. Yi-Chung Chen, Yandan Wang, Wei Zhang, Yiran Chen, Hai (Helen) Li
    Pages 277-293
  13. Venkateswar Kowkutla, Srivaths Ravi
    Pages 295-311
  14. Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay
    Pages 313-316

About this book

Introduction

This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems.

  • Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs;
  • Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; 
  • Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.

 

Keywords

Hardware Security and Trust Infrastructure IP for SoC Security Secure Embedded Systems Secure Integrated Circuits Security Verification Security for SoC Designs

Editors and affiliations

  • Swarup Bhunia
    • 1
  • Sandip Ray
    • 2
  • Susmita Sur-Kolay
    • 3
  1. 1.University of Florida GainesvilleUSA
  2. 2.NXP Semiconductors (United States) AustinUSA
  3. 3.Advanced Computing and MicroelectronicsIndian Statistical InstituteKolkataIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-50057-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-50055-3
  • Online ISBN 978-3-319-50057-7
  • Buy this book on publisher's site