Cantitate/Preț
Produs

Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence, nr. 1052)

De (autor) ,
Notă GoodReads:
en Limba Engleză Hardback – 20 Sep 2022
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.
Citește tot Restrânge

Din seria Studies in Computational Intelligence

Preț: 60780 lei

Preț vechi: 65355 lei
-7% Precomandă

Puncte Express: 912

Preț estimativ în valută:
11835 12199$ 10033£

Carte nepublicată încă

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811940163
ISBN-10: 9811940169
Ilustrații: XIII, 84 p. 31 illus., 18 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția: 1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Seria Studies in Computational Intelligence

Locul publicării: Singapore, Singapore

Cuprins

Chapter 1: Introduction.- Chapter 2: Fundamental Concepts of Machine Learning.- Chapter 3: Supervised Machine Learning Algorithms for PUF Modeling Attacks.- Chapter 4: Deep Learning based PUF Modeling Attacks.- Chapter 5: Tensor Regression based PUF Modeling Attack.- Chapter 6: Binarized Neural Network based PUF Modeling.- Chapter 7: Conclusions and Future Work. 

Notă biografică

Pranesh Santikellur is a Ph.D. student and a Senior Research Fellow in the Department of Computer Science and Engineering at the Indian Institute of Technology, Kharagpur. He received his B.E. degree in Electronics & Communication Engineering from Visvesvaraya Technological University, Belgaum, India, in 2010. He has a total of 6 years of industry experience at Horner Engineering India Pvt. Ltd. and Processor Systems. His primary research interest lies in hardware security, deep learning, and programmable logic controller security. He is an IEEE student member.
Rajat Subhra Chakraborty is an Associate Professor in the Department of Computer Science & Engineering of the Indian Institute of Technology, Kharagpur, India. He has professional experience working in National Semiconductor and Advanced Micro Devices (AMD). His research interest lies in the areas of hardware security, VLSI design, digital watermarking, and digital image forensics, in which he has published 4 books and over 100 papers in international journals and conferences of repute. He holds 2 granted U.S. patents. His publications have received over 3600 citations to date. Dr. Chakraborty has a Ph.D. in Computer Engineering from Case Western Reserve University, USA, and is a senior member of IEEE and ACM.


Textul de pe ultima copertă

The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.

Caracteristici

Discusses the various challenges present in the hardware security domain and how deep learning can solve it better
Introduces different deep learning-based techniques to solve several important hardware security problems
Describes machine learning methods and state-of-the-art deep learning practices for hardware security applications