000 | 03351nam a22005175i 4500 | ||
---|---|---|---|
999 |
_c200458226 _d76438 |
||
003 | TR-AnTOB | ||
005 | 20231121102934.0 | ||
007 | cr nn 008mamaa | ||
008 | 220422s2022 sz | s |||| 0|eng d | ||
020 | _a9783030941789 | ||
024 | 7 |
_a10.1007/978-3-030-94178-9 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aTK7895.E42 | |
072 | 7 |
_aUKM _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aUKM _2thema |
|
090 | _aTK7895.E42EBK | ||
245 | 1 | 0 |
_aMachine Learning for Embedded System Security _h[electronic resource] / _cedited by Basel Halak. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Machine Learning for Tamper Detection -- Machine Learning for IC Counterfeit Detection and Prevention -- Machine Learning for Secure PUF Design -- Machine Learning for Malware Analysis -- Machine Learning for Detection of Software Attacks -- Conclusions and Future Opportunities. . | |
520 | _aThis book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning; Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans; Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs); It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems. . | ||
650 | 0 | _aEmbedded computer systems. | |
650 | 0 | _aElectronic circuit design. | |
650 | 0 | _aMicroprocessors. | |
650 | 0 | _aComputer architecture. | |
650 | 1 | 4 | _aEmbedded Systems. |
650 | 2 | 4 | _aElectronics Design and Verification. |
650 | 2 | 4 | _aProcessor Architectures. |
653 | 0 | _aEmbedded computer systems -- Security measures | |
653 | 0 | _aMachine learning | |
700 | 1 |
_aHalak, Basel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-030-94178-9 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |