top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Dynamic Reconfiguration in Real-Time Systems [[electronic resource] ] : Energy, Performance, and Thermal Perspectives / / by Weixun Wang, Prabhat Mishra, Sanjay Ranka
Dynamic Reconfiguration in Real-Time Systems [[electronic resource] ] : Energy, Performance, and Thermal Perspectives / / by Weixun Wang, Prabhat Mishra, Sanjay Ranka
Autore Wang Weixun
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (232 p.)
Disciplina 006.3
Collana Embedded Systems
Soggetto topico Electronic circuits
Microprocessors
Energy
Circuits and Systems
Processor Architectures
Energy, general
ISBN 1-283-53173-9
9786613844187
1-4614-0278-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Modeling of Real-Time and Reconfigurable Systems -- Dynamic Cache Reconfiguration in Real-Time Systems -- Energy Optimization of Cache Hierarchy in Multicore Real-Time Systems -- Energy-Aware Scheduling with Dynamic Voltage Scaling -- System-wide Energy Optimization with DVS and DCR -- Temperature- and Energy-Constrained Scheduling -- Conclusions.
Record Nr. UNINA-9910438045303321
Wang Weixun  
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Explainable AI for Cybersecurity
Explainable AI for Cybersecurity
Autore Pan Zhixin
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2023
Descrizione fisica 1 online resource (249 pages)
Altri autori (Persone) MishraPrabhat
ISBN 3-031-46479-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- Acronyms -- Part I Introduction -- Cybersecurity Landscape for Computer Systems -- 1 Introduction -- 2 Cybersecurity Vulnerabilities -- 2.1 Hardware Vulnerabilities -- 2.1.1 Malicious Implants (Hardware Trojans) -- 2.1.2 Supply Chain Vulnerability -- 2.1.3 Reverse Engineering -- 2.1.4 Side-Channel Leakage -- 2.2 Software Vulnerabilities -- 2.2.1 Malware Attacks -- 2.2.2 Ransomware Attacks -- 2.2.3 Spectre and Meltdown Attacks -- 2.3 Malicious Attacks on Machine Learning Models -- 2.3.1 Adversarial Attacks -- 2.3.2 AI Trojan Attacks -- 3 Detection of Security Vulnerabilities -- 3.1 Detection of Malicious Hardware Attacks -- 3.1.1 Simulation-Based Validation Using Machine Learning -- 3.1.2 Side-Channel Analysis Using Machine Learning -- 3.1.3 Heuristic Analysis Using Machine Learning -- 3.2 Detection of Malicious Software Attacks -- 3.2.1 Detection of Malware Attacks -- 3.2.2 Detection of Ransomware Attacks -- 3.2.3 Detection of Spectre and Meltdown Attacks -- 4 Summary -- References -- Explainable Artificial Intelligence -- 1 Introduction -- 2 Machine Learning Models -- 2.1 Support Vector Machine -- 2.2 Multi-Layer Perceptron -- 2.3 Decision Tree -- 2.4 Random Forest -- 2.5 Linear Regression -- 2.6 Deep Neural Network -- 2.7 Convolution Neural Network -- 2.8 Recurrent Neural Network -- 2.9 Long Short-Term Memory -- 2.10 Reinforcement Learning -- 2.11 Boosting -- 2.12 Naive Bayes -- 2.13 Zero-Shot Learning -- 3 Explainable Artificial Intelligence -- 3.1 Local Interpretability -- 3.2 Knowledge Extraction -- 3.3 Saliency Maps -- 3.4 Integrated Gradients -- 3.5 Shapley Value Analysis -- 3.6 Layer-Wise Relevance Propagation -- 4 Summary -- References -- Part II Detection of Software Vulnerabilities -- Malware Detection Using Explainable AI -- 1 Introduction -- 2 Background and Related Work.
2.1 Malware Detection Challenges -- 2.2 Why Explainable AI for Malware Detection? -- 3 Malware Detection Using Explainable Machine Learning -- 3.1 Model Training -- 3.2 Perturbation and Outlier Elimination -- 3.3 Linear Regression -- 3.4 Outcome Interpretation -- 4 Experiments -- 4.1 Experimental Platform -- 4.2 Malware and Benign Benchmarks -- 4.3 Data Acquisition -- 4.4 RNN Classifier -- 4.5 Evaluation: Accuracy -- 4.6 Evaluation: Outcome Interpretation -- 5 Summary -- References -- Spectre and Meltdown Detection Using Explainable AI -- 1 Introduction -- 1.1 Threat Model -- 1.2 Motivation -- 2 Background and Related Work -- 2.1 Spectre and Meltdown Attacks -- 2.2 Explainable Machine Learning -- 3 Detection of Spectre and Meltdown Attacks -- 3.1 Data Collection -- 3.2 Model Training -- 3.2.1 LSTM-Based Model Training -- 3.2.2 Ensemble Boosting -- 3.3 Result Interpretation -- 3.3.1 Explainability Using Model Distillation -- 3.3.2 Explainability Using Shapely Values -- 3.4 Data Augmentation -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Comparison with Existing Spectre Detection Methods -- 4.3 Comparison with Existing Meltdown Detection Methods -- 4.4 Comparison with Existing Mitigation Techniques -- 4.5 Stability Analysis -- 4.6 Explainability Analysis -- 4.7 Efficiency Analysis -- 5 Summary -- References -- Part III Detection of Hardware Vulnerabilities -- Hardware Trojan Detection Using Reinforcement Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Logic Testing for Hardware Trojan Detection -- 2.2 Reinforcement Learning -- 3 Test Generation Using Reinforcement Learning -- 3.1 Identification of Rare Nodes -- 3.2 Testability Analysis -- 3.3 Utilization of Reinforcement Learning -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Results on Trigger Coverage -- 4.3 Results on Test Generation Time -- 5 Summary -- References.
Hardware Trojan Detection Using Side-Channel Analysis -- 1 Introduction -- 2 Background and Motivation -- 2.1 Background: Reinforcement Learning -- 2.2 Motivation: Delay-Based Side-Channel Analysis -- 3 Reinforcement Learning-Based Path Delay Analysis -- 3.1 Overview -- 3.2 Generation of Initial Vectors -- 3.3 Generation of Succeeding Vectors -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Results -- 5 Summary -- References -- Hardware Trojan Detection Using Shapley Ensemble Boosting -- 1 Introduction -- 2 Background and Related Work -- 2.1 Related Work for Hardware Trojan Detection -- 2.2 Ensemble Boosting -- 2.3 Shapley Values -- 3 Shapley Ensemble Boosting for Hardware Trojan Detection -- 3.1 Data Sampling -- 3.2 Model Training -- 3.3 Shapley Analysis -- 3.4 Weight Adjustment -- 3.5 Ensemble Prediction -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 HT Detection Performance -- 4.3 Explainability Analysis -- 4.4 Efficiency Analysis -- 4.5 Robustness Analysis -- 5 Summary -- References -- Part IV Mitigation of AI Vulnerabilities -- Mitigation of Adversarial Machine Learning -- 1 Introduction -- 2 Background and Preliminaries -- 2.1 Attacks on Neural Networks -- 2.2 Spectral Normalization -- 3 Spectral Normalization to Defend Against Adversarial Attacks -- 3.1 Layer Separation -- 3.2 Fourier Transform -- 3.3 Activation Functions -- 3.4 Complexity Analysis -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Case Study: MNIST Benchmark -- 4.3 Case Study: ImageNet Benchmark -- 5 Summary -- References -- AI Trojan Attacks and Countermeasures -- 1 Introduction -- 2 Background and Related Work -- 3 Backdoor Attack with AI Trojans -- 3.1 Feature Extraction -- 3.2 Normal Training -- 3.3 Backdoor Training -- 3.4 Trojan Injection -- 4 Defenses Against AI Trojans -- 4.1 Pruning -- 4.2 Bayesian Neural Networks -- 4.3 Neural Cleanse.
4.4 Artificial Brain Stimulation (ABS) -- 4.5 STRIP -- 5 Experiments -- 5.1 Experimental Setup -- 5.2 Comparison of Attack Performance -- 5.3 Overhead Analysis -- 5.4 Robustness Against STRIP-Based Defense -- 6 Summary -- References -- Part V Acceleration of Explainable AI -- Hardware Acceleration of Explainable AI -- 1 Introduction -- 1.1 Graphics Processing Unit -- 1.2 Field Programmable Gate Array -- 2 FPGA-Based Acceleration of Heatmap Visualization -- 3 FPGA-Based Acceleration of Saliency Map -- 4 GPU-Based Acceleration of Shapley Value Analysis -- 4.1 Summary -- References -- Explainable AI Acceleration Using Tensor Processing Units -- 1 Introduction -- 2 Tensor Processing Units -- 3 Hardware Acceleration of Explainable AI -- 3.1 Task Transformation -- 3.2 Data Decomposition in Fourier Transform -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Comparison of Accuracy and Classification Time -- 4.3 Comparison of Energy Efficiency -- 5 Summary -- References -- Part VI Conclusion -- The Future of AI-Enabled Cybersecurity -- 1 Introduction -- 2 Summary -- 2.1 Introduction to Cybersecurity and Explainable AI -- 2.1.1 Detection of Software Vulnerabilities -- 2.2 Detection of Hardware Vulnerabilities -- 2.3 Mitigation of AI Vulnerabilities -- 2.4 Acceleration of Explainable AI -- 3 Future Directions -- 3.1 Automatic Implementation of Secure Systems -- 3.2 Detection of Malicious Implants -- 3.3 Detection of Ransomware Attacks -- 3.4 Automatic Data Augmentation -- References -- Index.
Record Nr. UNINA-9910770274903321
Pan Zhixin  
Cham : , : Springer International Publishing AG, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hardware IP Security and Trust / / edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
Hardware IP Security and Trust / / edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 353 p. 131 illus., 78 illus. in color.)
Disciplina 621.3815
Soggetto topico Electronic circuits
Data encryption (Computer science)
Computer security
Electronics
Microelectronics
Microprocessors
Circuits and Systems
Cryptology
Systems and Data Security
Electronics and Microelectronics, Instrumentation
Processor Architectures
ISBN 3-319-49025-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design.
Record Nr. UNINA-9910157473003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Silicon Validation and Debug / / edited by Prabhat Mishra, Farimah Farahmandi
Post-Silicon Validation and Debug / / edited by Prabhat Mishra, Farimah Farahmandi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (393 pages)
Disciplina 005.14
Soggetto topico Electronic circuits
Microprocessors
Electronics
Microelectronics
Circuits and Systems
Processor Architectures
Electronics and Microelectronics, Instrumentation
ISBN 3-319-98116-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Introduction -- Post-Silicon SoC Validation Challenges -- Part 2. Debug Infrastructure -- SoC Instrumentations: Pre-silicon Preparation for Post-silicon Readiness -- Structure-based Signal Selection for Post-silicon Validation -- Simulation-based Signal Selection -- Hybrid Signal Selection -- Post-Silicon Signal Selection using Machine Learning -- Part 3. Generation of Tests and Assertions -- Observability-aware Post-Silicon Test Generation -- On-chip Constrained-Random Stimuli Generation -- Test Generation and Lightweight Checking for Multi-core Memory Consistency -- Selection of Post-Silicon Hardware Assertions -- Part 4. Post-Silicon Debug -- Debug Data Reduction Techniques -- High-level Debugging of Post-silicon Failures -- Post-silicon Fault Localization with Satisfiability Solvers -- Coverage Evaluation and Analysis of Post-silicon Tests with Virtual Prototypes -- Utilization of Debug Infrastructure for Post-Silicon Coverage Analysis -- Part 5. Case Studies -- Network-on-Chip Validation and Debug -- Post-silicon Validation of the IBM Power8 Processor -- Part 6. Conclusion and Future Directions -- SoC Security versus Post-Silicon Debug Conflict -- The Future of Post-Silicon Debug.
Record Nr. UNINA-9910337649803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
System-on-Chip Security : Validation and Verification / / by Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra
System-on-Chip Security : Validation and Verification / / by Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra
Autore Farahmandi Farimah
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (295 pages)
Disciplina 621.3815
Soggetto topico Electronic circuits
Microprocessors
Electronics
Microelectronics
Circuits and Systems
Processor Architectures
Electronics and Microelectronics, Instrumentation
ISBN 3-030-30596-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Security Verification Using Formal Methods -- Simulation-Based Security Validation Approaches -- Security Validation Using Side-Channel Analysis -- Automated Vulnerability Detection And Mitigation -- Conclusion.
Record Nr. UNINA-9910366578803321
Farahmandi Farimah  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui