This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.
"synopsis" may belong to another edition of this title.
Srinivas Katkoori is an Associate Professor of Computer Science and Engineering at the
University of South Florida, Florida, Tampa, FL, USA. His research interests include VLSI design and CAD, high-level synthesis, low power VLSI synthesis, IC reliability, evolutionary algorithms, and hardware security. He has authored over 100 peer-reviewed journal and conference papers. He holds one U.S. patent (6 963 217). He was a recipient of the 2001 NSF Career Award, the 2002–2003 USF Outstanding Faculty Research Achievement Award, the 2005 Outstanding Engineering Educator Award from the IEEE Florida Council (Region 3), the 2007–2008 USF Undergraduate Teaching Award, and the 2013 USF Jerome Krivanek Distinguished Teacher Award. Dr. Katkoori received the Ph.D. degree from the University of Cincinnati, Cincinnati, OH, USA, in 1998. Dr. Katkoori is a Senior Member of ACM and IEEE.
Sheikh Ariful Islam received the B.Sc. degree in Electronics and Communication Engineering from Khulna University of Engineering and Technology, Bangladesh, in 2011. He is currently pursuing Ph.D. degree in Computer Engineering at the University of South Florida, Tampa. His current research interests include the development of security and reliability aware high-level synthesis tools. To date, he has published 7 papers in peer-reviewed conferences and journals. He received best paper nomination at 2018 AsianHOST Conference held in Hong Kong. Before he joined USF, he served as lecturer in Bangladesh for two years. He has extensive teaching experience in computer architecture and system design. He completed an internship at ON Semiconductor in Fall 2018.
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.
"About this title" may belong to another edition of this title.
£ 1.98 shipping within U.S.A.
Destination, rates & speeds£ 5.87 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # S0-9783030788407
Quantity: 1 available
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condition: new. Hardcover. This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9783030788407
Quantity: 1 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020029989
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 44131372-n
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 413 pages. 9.25x6.10x1.02 inches. In Stock. This item is printed on demand. Seller Inventory # __3030788407
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783030788407_new
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 44131372-n
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 44131372
Quantity: Over 20 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783030788407
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection. 416 pp. Englisch. Seller Inventory # 9783030788407
Quantity: 2 available