000 | 03280nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-030-79701-0 | ||
003 | DE-He213 | ||
005 | 20240423125059.0 | ||
007 | cr nn 008mamaa | ||
008 | 210823s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030797010 _9978-3-030-79701-0 |
||
024 | 7 |
_a10.1007/978-3-030-79701-0 _2doi |
|
050 | 4 | _aQA76.5-.73 | |
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM011000 _2bisacsh |
|
072 | 7 |
_aUYQE _2thema |
|
082 | 0 | 4 |
_a004 _223 |
100 | 1 |
_aGuha, Krishnendu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSelf Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms _h[electronic resource] / _cby Krishnendu Guha, Sangeet Saha, Amlan Chakrabarti. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXVIII, 183 p. 91 illus., 79 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Real-time Scheduling : Background and Trends -- Scheduling Algorithms for Reconfigurable Systems -- Introduction to Hardware Security for FPGA based Systems -- Bypassing Passive Attacks -- Counteracting Active Attacks -- Handling Power Draining Attacks. | |
520 | _aThis book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime. | ||
650 | 0 | _aComputers, Special purpose. | |
650 | 0 | _aEmbedded computer systems. | |
650 | 0 | _aSecurity systems. | |
650 | 0 | _aElectronic circuits. | |
650 | 1 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aEmbedded Systems. |
650 | 2 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aElectronic Circuits and Systems. |
700 | 1 |
_aSaha, Sangeet. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aChakrabarti, Amlan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030797003 |
776 | 0 | 8 |
_iPrinted edition: _z9783030797027 |
776 | 0 | 8 |
_iPrinted edition: _z9783030797034 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-79701-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c174015 _d174015 |