Narrow your search

Library

AP (2)

KDG (2)

KU Leuven (2)

UGent (2)

ULiège (2)

EhB (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

More...

Resource type

book (3)

digital (2)


Language

English (5)


Year
From To Submit

2017 (2)

2011 (2)

2008 (1)

Listing 1 - 5 of 5
Sort by

Book
Foundations of Hardware IP Protection
Authors: ---
ISBN: 3319503804 3319503782 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems.


Digital
Foundations of Hardware IP Protection
Authors: ---
ISBN: 9783319503806 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems.


Book
Security Trends for FPGAS : From Secured to Secure Reconfigurable Systems
Authors: --- --- --- --- --- et al.
ISBN: 9789400713383 Year: 2011 Publisher: Dordrecht Springer Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs.  It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company. This book details several solutions for secure application execution and application update.  It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication.  These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption).  The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream.  Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed. Proposes solutions at the logical, architecture and system levels in order to provide a global solution Clearly defines the security boundaries for a system Describes different hierarchical levels of a design, from application to technological levels


Digital
Security Trends for FPGAS : From Secured to Secure Reconfigurable Systems
Authors: --- --- --- ---
ISBN: 9789400713383 Year: 2011 Publisher: Dordrecht Springer Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Trends in VLSI technology and design : proceedings : IEEE Computer Society Annual Symposium on VLSI : 7-9 April 2008, Montpellier, France
Authors: --- --- --- --- --- et al.
ISBN: 0769532918 0769531709 1509083812 Year: 2008 Publisher: New York : IEEE,

Listing 1 - 5 of 5
Sort by