Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/security-policy-in-system-on-chip-designs/descriptif_3843491
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3843491

Security Policy in System-on-Chip Designs, Softcover reprint of the original 1st ed. 2019 Specification, Implementation and Verification

Langue : Anglais
Couverture de l’ouvrage Security Policy in System-on-Chip Designs

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs ? current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for ?hardware patching?, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.

  • Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
  • Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
  • Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
  • Introduces a rigorous, disciplined approach to ?hardware patching?, i.e., secure technique for updating hardware functionality of computing devices in-field;
  • Includes discussion of current and emerging approaches for security policy verification.

Chapter1: SoC Security Policies: The State of the Practice.- Chapter2: E-IIPS: A Centralized Policy Implementation Architecture.- Chapter3: Exploiting Design-for-Debug in SoC Security Policy Architecture.- Chapter4: Security Assurance in SoC in presence of Untrusted IP Blocks.- Chapter5: A Move Towards a Hardware Patch.- Chapter6: SoC Security Policy Verification.- Chapter7: SoC Security Policies: Summary and Future Directions.

Sandip Ray is an Endowed IoT Term Professor at the Department of Electrical and Computer Engineering, University of Florida. His research involves developing correct, dependable, secure, and trustworthy computing through cooperation of specification, synthesis, architecture and validation technologies. His research targets next-generation computing applications, including autonomous automotive systems, smart homes, intelligent implants, etc. Before joining University of Florida, Dr. Ray was a Senior Principal Engineer at NXP Semiconductors, where he led the R&D on security validation for automotive and Internet- of-Things applications. Prior to that, he was a Research Scientist at Intel Strategic CAD Labs, where he worked on pre-silicon and post-silicon validation of security and functional correctness of SoC designs, design-for-security and design-for-debug architectures, CAD tools, and specifications for SoC design requirements. Prior to joining industry, Dr. Ray was a Research Scientist at University of Texas at Austin, where he led several sponsored projects from DARPA, SRC, and National Science Foundation. Dr. Ray is the author of three books (one upcoming) and over 60 publications in peer-reviewed premier international journals and conferences. He served as guest editors for an IEEE Transactions on Multi-Scale Systems (TMSCS) special issue on Wearables, Implants, and Internet-of-Things, as well as special issues of ACM Transactions on Design Automation of Electronic Systems (TODAES) and Springer Journal on Electronic Testing Theory and Applications (JETTA).  He has given number of invited, tutorial, and keynote presentations at several international forums on security, validation, and energy challenges in the IoT regime. During his tenure in industry, Dr. Ray served as Intel and NXP representative in Semiconductor Research Consortium (SRC) technical advisory board, and as semiconductor industry representative on trustworthy systems to the Semic

Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field Includes discussion of current and emerging approaches for security policy verification

Date de parution :

Ouvrage de 116 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

52,74 €

Ajouter au panier

Date de parution :

Ouvrage de 116 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

52,74 €

Ajouter au panier