Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15195
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Chaurasia, Rahul | en_US |
dc.date.accessioned | 2024-12-24T05:20:10Z | - |
dc.date.available | 2024-12-24T05:20:10Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Sengupta, A., & Chaurasia, R. (2024). Introduction to hardware security and trust and high-level synthesis. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 1–24). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch1 | en_US |
dc.identifier.isbn | 978-183724118-7 | - |
dc.identifier.isbn | 978-183724117-0 | - |
dc.identifier.other | EID(2-s2.0-85211880415) | - |
dc.identifier.uri | https://doi.org/10.1049/PBCS084E_ch1 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15195 | - |
dc.description.abstract | The chapter provides the readers with a formal introduction to achieving hardware security and trust through high-level synthesis (HLS) followed by its motivation and comprehensive exploration of different hardware attack scenarios and countermeasures. An adversary (situated in different design phases) may potentially leverage various attack scenarios to compromise the confidentiality, integrity, and reliability of electronic systems comprising reusable hardware designs. Addressing these threats necessitates a comprehensive understanding of hardware security and a proactive approach to fortify systems against potential threats. This chapter aims to contribute to the development of secure and trustworthy computing systems by providing a basic foundation for security aware HLS-based hardware design methodology, different attack scenarios, and effective countermeasures. This chapter therefore bridges the gap between the existing hardware security challenges and its advanced countermeasure strategies. The rest of the chapter is structured as follows: Section 1.1 provides the introduction of the chapter including motivation for hardware security and trust | en_US |
dc.description.abstract | Section 1.2 discusses different attack scenarios | en_US |
dc.description.abstract | Section 1.3 provides different security countermeasures | en_US |
dc.description.abstract | Section 1.4 discusses the utility of the HLS framework for integrating security countermeasures | en_US |
dc.description.abstract | Section 1.5 presents a brief summary of the book | en_US |
dc.description.abstract | Section 1.6 concludes the chapter by summarizing its significance and implications. © The Institution of Engineering and Technology and its licensors 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection | en_US |
dc.title | Introduction to hardware security and trust and high-level synthesis | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: