LEADER 03835nam 22005775 450 001 9910298979503321 005 20220218184613.0 010 $a3-658-07005-6 024 7 $a10.1007/978-3-658-07005-2 035 $a(CKB)3710000000227030 035 $a(EBL)1802609 035 $a(SSID)ssj0001338458 035 $a(PQKBManifestationID)11735561 035 $a(PQKBTitleCode)TC0001338458 035 $a(PQKBWorkID)11337923 035 $a(PQKB)11610679 035 $a(MiAaPQ)EBC1802609 035 $a(DE-He213)978-3-658-07005-2 035 $a(PPN)180623605 035 $a(EXLCZ)993710000000227030 100 $a20140825d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTrustworthy Reconfigurable Systems $eEnhancing the Security Capabilities of Reconfigurable Hardware Architectures /$fby Thomas Feller 205 $a1st ed. 2014. 210 1$aWiesbaden :$cSpringer Fachmedien Wiesbaden :$cImprint: Springer Vieweg,$d2014. 215 $a1 online resource (228 p.) 300 $aDescription based upon print version of record. 311 0 $a1-322-17256-0 311 0 $a3-658-07004-8 320 $aIncludes bibliographical references. 327 $aIntroduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security and Cyber-Physical Threats -- Towards Trustworthy Cyber-Physical Systems -- Application Scenarios -- Summary. 330 $aThomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime. Contents Trustworthy Systems, Reconfigurable Architectures FPGA Design Security, Authenticated Encryption Physical Attack Resistance, System Security Target Groups Researchers and students in the field of reconfigurable hardware architectures with an emphasis on secure and trustworthy systems Practitioners using reconfigurable architectures and need to provide a high level of protection against overproduction and counterfeiting. The Author Thomas Feller finished his doctoral thesis at the Center of Advanced Security Research (CASED) and the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss. 606 $aComputer input-output equipment 606 $aData structures (Computer science) 606 $aComputer Hardware$3https://scigraph.springernature.com/ontologies/product-market-codes/I1200X 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 615 0$aComputer input-output equipment. 615 0$aData structures (Computer science) 615 14$aComputer Hardware. 615 24$aData Structures and Information Theory. 676 $a004 676 $a005.82 700 $aFeller$b Thomas$4aut$4http://id.loc.gov/vocabulary/relators/aut$0995758 906 $aBOOK 912 $a9910298979503321 996 $aTrustworthy Reconfigurable Systems$92281689 997 $aUNINA LEADER 00561nam 2200193zu 450 001 9910985892903321 005 20250421213548.0 035 $a(CKB)37784149300041 035 $a(EXLCZ)9937784149300041 100 $a20250309|2020uuuu || | 101 0 $afre 135 $aur||||||||||| 200 10$aArt est une arme de combat féministe 210 $cPresses universitaires de Rouen et du Havre$d2020 700 $aFaubert$b Samantha$01308783 906 $aBOOK 912 $a9910985892903321 996 $aArt est une arme de combat féministe$94327242 997 $aUNINA