Cargando…

Trusted Computing for Embedded Systems

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and softwar...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Candaele, Bernard (Editor ), Soudris, Dimitrios (Editor ), Anagnostopoulos, Iraklis (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-09420-5
003 DE-He213
005 20220115010117.0
007 cr nn 008mamaa
008 141211s2015 sz | s |||| 0|eng d
020 |a 9783319094205  |9 978-3-319-09420-5 
024 7 |a 10.1007/978-3-319-09420-5  |2 doi 
050 4 |a TK7867-7867.5 
072 7 |a TJFC  |2 bicssc 
072 7 |a TEC008010  |2 bisacsh 
072 7 |a TJFC  |2 thema 
082 0 4 |a 621.3815  |2 23 
245 1 0 |a Trusted Computing for Embedded Systems  |h [electronic resource] /  |c edited by Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XXVI, 299 p. 151 illus., 102 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I Introduction -- Programming Interfaces for the TPM -- Part II Application-Use cases -- Chapter 2: ARM TrustZone -- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges -- Authentication and mutual authentication -- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN -- Part III Building blocks -- Physically Unclonable Function: Principle, design and characterization of the Loop PUF -- Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF -- Fault Sensitivity Analysis at Design Time -- Information Theoretic Comparison of Side-channel Distinguishers -- Part III Advanced Galileo Positioning technologies -- Wireless Sensor Networks: Routing protocol for critical infrastructure protection -- Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation -- Heap management for trusted operating environments -- IP-XACT extensions for cryptographic IP. 
520 |a This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; ·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.  . 
650 0 |a Electronic circuits. 
650 0 |a Microprocessors. 
650 0 |a Computer architecture. 
650 0 |a Electronics. 
650 0 |a Data protection. 
650 1 4 |a Electronic Circuits and Systems. 
650 2 4 |a Processor Architectures. 
650 2 4 |a Electronics and Microelectronics, Instrumentation. 
650 2 4 |a Data and Information Security. 
700 1 |a Candaele, Bernard.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Soudris, Dimitrios.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Anagnostopoulos, Iraklis.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319094199 
776 0 8 |i Printed edition:  |z 9783319094212 
776 0 8 |i Printed edition:  |z 9783319362793 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-09420-5  |z Texto Completo 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)