03835nam 22005775 450 991029897950332120220218184613.03-658-07005-610.1007/978-3-658-07005-2(CKB)3710000000227030(EBL)1802609(SSID)ssj0001338458(PQKBManifestationID)11735561(PQKBTitleCode)TC0001338458(PQKBWorkID)11337923(PQKB)11610679(MiAaPQ)EBC1802609(DE-He213)978-3-658-07005-2(PPN)180623605(EXLCZ)99371000000022703020140825d2014 u| 0engur|n|---|||||txtccrTrustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures /by Thomas Feller1st ed. 2014.Wiesbaden :Springer Fachmedien Wiesbaden :Imprint: Springer Vieweg,2014.1 online resource (228 p.)Description based upon print version of record.1-322-17256-0 3-658-07004-8 Includes bibliographical references.Introduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security and Cyber-Physical Threats -- Towards Trustworthy Cyber-Physical Systems -- Application Scenarios -- Summary.Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime. Contents Trustworthy Systems, Reconfigurable Architectures FPGA Design Security, Authenticated Encryption Physical Attack Resistance, System Security Target Groups Researchers and students in the field of reconfigurable hardware architectures with an emphasis on secure and trustworthy systems Practitioners using reconfigurable architectures and need to provide a high level of protection against overproduction and counterfeiting. The Author Thomas Feller finished his doctoral thesis at the Center of Advanced Security Research (CASED) and the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss.Computer input-output equipmentData structures (Computer science)Computer Hardwarehttps://scigraph.springernature.com/ontologies/product-market-codes/I1200XData Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computer input-output equipment.Data structures (Computer science)Computer Hardware.Data Structures and Information Theory.004005.82Feller Thomasauthttp://id.loc.gov/vocabulary/relators/aut995758BOOK9910298979503321Trustworthy Reconfigurable Systems2281689UNINA