Security policy in system-on-chip designs : specification, implementation and verification /

Saved in:
Bibliographic Details
Author / Creator:Ray, Sandip, author.
Imprint:Cham, Switzerland : Springer, [2019].
Description:1 online resource.
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11745974
Hidden Bibliographic Details
Other authors / contributors:Basak, Abhishek, author.
Bhunia, Swarup, author.
ISBN:9783319934648
3319934643
9783319934631
3319934635
9783319934631
9783319934655
3319934651
9783030066666
3030066665
Digital file characteristics:text file PDF
Notes:Includes bibliographical references and index.
Online resource; title from PDF title page (Ebsco, viewed October 15, 2018).
Summary:This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.
Other form:Printed edition: 9783319934631
Printed edition: 9783319934655
Standard no.:10.1007/978-3-319-93464-8