000 | 03333nam a22005535i 4500 | ||
---|---|---|---|
999 |
_c200457928 _d76140 |
||
003 | TR-AnTOB | ||
005 | 20231123160639.0 | ||
007 | cr nn 008mamaa | ||
008 | 220328s2022 sz | s |||| 0|eng d | ||
020 | _a9783030932749 | ||
024 | 7 |
_a10.1007/978-3-030-93274-9 _2doi |
|
040 |
_aTR-AnTOB _beng _cTR-AnTOB _erda |
||
041 | _aeng | ||
050 | 4 | _aTK7895.E42 | |
072 | 7 |
_aUKM _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aUKM _2thema |
|
090 | _aTK7895.E42EBK | ||
100 | 1 |
_aMohammed, Shayan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSecurity of Biochip Cyberphysical Systems _h[electronic resource] / _cby Shayan Mohammed, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, Ramesh Karri. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Threat landscape -- Architecture for Security -- Tools for Security -- Watermarking of Bio-IP -- Obfuscation of Bio-IP -- Conclusion. | |
520 | _aThis book provides readers with a valuable guide to understanding security and the interplay of computer science, microfluidics, and biochemistry in a biochip cyberphysical system (CPS). The authors uncover new, potential threat and trust-issues to address, as this emerging technology is poised to be adapted at a large scale. Readers will learn how to secure biochip CPS by leveraging the available resources in different application contexts, as well as how to ensure intellectual property (IP) is protected against theft and counterfeits. This book enables secure biochip CPS design by helping bridge the knowledge gap at the intersection of the multi-disciplinary technology that drives biochip CPS. Provides tools for security analysis and verification: a machine learning (ML) framework; Paints the threat landscape of the biochip CPS, describing the threat models - the who, the how, and the why; Uses real case studies to describe models of tampering attack, microfluidic trojan attack. | ||
650 | 0 | _aEmbedded computer systems. | |
650 | 0 | _aElectronic circuit design. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 1 | 4 | _aEmbedded Systems. |
650 | 2 | 4 | _aElectronics Design and Verification. |
650 | 2 | 4 | _aCyber-Physical Systems. |
653 | 0 | _aCooperating objects (Computer systems) -- Security measures | |
653 | 0 | _aBiochips -- Security measures | |
700 | 1 |
_aBhattacharjee, Sukanta. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aSong, Yong-Ak. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aChakrabarty, Krishnendu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aKarri, Ramesh. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-030-93274-9 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |