A Synergistic Framework for Hardware IP Privacy and Integrity Protection - Meng Li, David Z. Pan

A Synergistic Framework for Hardware IP Privacy and Integrity Protection

, (Autoren)

Buch | Hardcover
IX, 139 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-41246-3 (ISBN)
128,39 inkl. MwSt
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.

Meng Li received his B.S. degree in Microelectronics from Peking University, China in 2013 and his Ph.D. degree in Electrical and Computer Engineering from the University of Texas at Austin in 2018. He is currently a research scientist in Facebook Inc. His research interests include deep learning acceleration, hardware-oriented security and reliability.  Meng Li received many awards, including the Margarida Jacome Dissertation Prize from the University of Texas at Austin in 2019, the EDAA Outstanding Dissertation Award in 2019, the First Place in the grand final of ACM student research competition in 2018, the Best Poster (Presentation) Award in ASPDAC Ph.D. forum in 2018, the Gold Medal in ACM ICCAD student research competition in 2017, and the University Graduate Fellowship from UT Austin in 2013. He also received the Best Paper Award in HOST’17 and GLSVLSI’18.  David Z. Pan received his BS degree from Peking University and MS/PhD degrees from UCLA. He is currently Engineering Foundation Professor at the Department of Electrical and Computer Engineering, The University of Texas at Austin. His research interests include cross-layer IC design for manufacturing, reliability, security, machine learning in EDA, hardware acceleration, CAD for analog/mixed signal designs and emerging technologies. He has published over 360 refereed journal/conference papers and 8 US patents. He has served in many journal editorial boards and conference committees, including various leadership roles. He has received many awards, including SRC Technical Excellence Award, 18 Best Paper Awards, DAC Top 10 Author Award in Fifth Decade, ASP-DAC Frequently Cited Author Award, Communications of ACM Research Highlights, ACM/SIGDA Outstanding New Faculty Award, NSF CAREER Award, IBM Faculty Award (4 times), UCLA Engineering Distinguished Young Alumnus Award, UT Austin RAISE Faculty Excellence Award, etc. He is a Fellow of IEEE and SPIE.

Introduction.- Practical Split Manufacturing Optimization.- IC Camouflaging Optimization and Evaluation.- Fault Attack Protection and Evaluation.- Conclusion.

Erscheinungsdatum
Zusatzinfo IX, 139 p. 74 illus., 67 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 401 g
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Technik Elektrotechnik / Energietechnik
Schlagworte Hardware IP Security and Trust • Hardware security and trust • Hardware trojans • IP privacy and integrity • IP security
ISBN-10 3-030-41246-6 / 3030412466
ISBN-13 978-3-030-41246-3 / 9783030412463
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Grundlagen – Anwendungen – Perspektiven

von Matthias Homeister

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
was jeder über Informatik wissen sollte

von Timm Eichstädt; Stefan Spieker

Buch | Softcover (2024)
Springer Vieweg (Verlag)
37,99
Eine Einführung in die Systemtheorie

von Margot Berghaus

Buch | Softcover (2022)
UTB (Verlag)
25,00