http://iet.metastore.ingenta.com
1887

Introduction to IP core protection and hardware-assisted security of consumer electronics

Introduction to IP core protection and hardware-assisted security of consumer electronics

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IP Core Protection and Hardware-Assisted Security for Consumer Electronics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter presents an overview of the book and discussions on topics that could serve as an introductory part toward the overall content of the book. It is assumed that the readers will have some subject knowledge on topics such as very large scale integration (VLSI), embedded systems, hardware design flow, etc., before adopting the section of this book.

Chapter Contents:

  • 1.1 Consumer electronics and security perspectives
  • 1.2 Hardware-assisted security and IP core protection
  • 1.3 Intellectual property (IP) cores/hardware
  • 1.3.1 Utility of IP cores in CE devices
  • 1.3.2 Why security and protection of hardware/IP cores?
  • 1.3.3 Traditional forms of IP protection not enough?
  • 1.4 IP core protection and hardware-assisted security of CE device—DSP core
  • 1.4.1 Security and protection methodologies available for IP core/hardware
  • 1.4.2 Different IP core protection and hardware-assisted security mechanisms: advantages and disadvantages
  • 1.4.2.1 Hardware metering vs. hardware watermarking
  • 1.4.2.2 Hardware obfuscation vs. hardware watermarking
  • 1.4.2.3 Computational forensic engineering vs. hardware watermarking
  • 1.4.3 HLS (architectural synthesis) as design backbone for implementing security algorithms for DSP IP cores
  • 1.5 Hardware-assisted media protection
  • 1.6 Physical unclonable functions
  • 1.7 Organization of the book
  • 1.8 Conclusions
  • 1.9 Exercises
  • References

Inspec keywords: security; consumer electronics; industrial property

Other keywords: hardware design flow; consumer electronics; IP core protection; VLSI; very large scale integration; embedded systems; hardware-assisted security

Subjects: Legal aspects of computing; Administration and management

Preview this chapter:
Zoom in
Zoomout

Introduction to IP core protection and hardware-assisted security of consumer electronics, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch1-1.gif /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch1-2.gif

Related content

content/books/10.1049/pbcs060e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address