語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ null ]
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
An Exploration into the Security Viability of RISC-V Systems and Supply Chain.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An Exploration into the Security Viability of RISC-V Systems and Supply Chain./
作者:
De, Asmit.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
165 p.
附註:
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Contained By:
Dissertations Abstracts International83-03B.
標題:
Software. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28841748
ISBN:
9798460448418
An Exploration into the Security Viability of RISC-V Systems and Supply Chain.
De, Asmit.
An Exploration into the Security Viability of RISC-V Systems and Supply Chain.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 165 p.
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Thesis (Ph.D.)--The Pennsylvania State University, 2021.
This item must not be sold to any third party vendors.
RISC-V is a promising open-source architecture that have gained a lot of traction in the recent years. The architecture is primarily targeted towards low-power embedded devices and SoCs, however, due to its flexibility and customizability it can also be adapted to other applications such as machine learning accelerators and data-center microprocessors. Due to the open platform, RISC-V SoCs allow rapid prototyping and faster time-to-market. This is made possible due to the distributed nature of the semiconductor supply chain, such as sourcing certain components from IP vendors and using third party foundries. However, this also poses security concerns. For embedded devices such as IoTs, RISC-V often allows programs and applications to run bare-metal on the system. Such applications have full access to the underlying memory subsystem, and thereby opens up the risk of memory vulnerabilities, if not designed with proper security practices. Moreover, the involvement of several third parties also makes the supply chain vulnerable to IP theft and IC piracy. In this dissertation, we explore different hardware accelerated security designs for mitigating several system security vulnerabilities. To further secure the design development stack of SoCs, we explore hardware security principles for preventing reverse engineering and IP design theft.
ISBN: 9798460448418Subjects--Topical Terms:
619355
Software.
Subjects--Index Terms:
Open source software
An Exploration into the Security Viability of RISC-V Systems and Supply Chain.
LDR
:02463nmm a2200337 4500
001
2348093
005
20220906075203.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798460448418
035
$a
(MiAaPQ)AAI28841748
035
$a
(MiAaPQ)PennState_23958aud311
035
$a
AAI28841748
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
De, Asmit.
$3
3687414
245
1 3
$a
An Exploration into the Security Viability of RISC-V Systems and Supply Chain.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
165 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
500
$a
Advisor: Ghosh, Swaroop.
502
$a
Thesis (Ph.D.)--The Pennsylvania State University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
RISC-V is a promising open-source architecture that have gained a lot of traction in the recent years. The architecture is primarily targeted towards low-power embedded devices and SoCs, however, due to its flexibility and customizability it can also be adapted to other applications such as machine learning accelerators and data-center microprocessors. Due to the open platform, RISC-V SoCs allow rapid prototyping and faster time-to-market. This is made possible due to the distributed nature of the semiconductor supply chain, such as sourcing certain components from IP vendors and using third party foundries. However, this also poses security concerns. For embedded devices such as IoTs, RISC-V often allows programs and applications to run bare-metal on the system. Such applications have full access to the underlying memory subsystem, and thereby opens up the risk of memory vulnerabilities, if not designed with proper security practices. Moreover, the involvement of several third parties also makes the supply chain vulnerable to IP theft and IC piracy. In this dissertation, we explore different hardware accelerated security designs for mitigating several system security vulnerabilities. To further secure the design development stack of SoCs, we explore hardware security principles for preventing reverse engineering and IP design theft.
590
$a
School code: 0176.
650
4
$a
Software.
$2
gtt.
$3
619355
650
4
$a
Semiconductor research.
$3
3683765
650
4
$a
Microprocessors.
$3
517143
650
4
$a
Code reuse.
$3
3687415
650
4
$a
Access control.
$3
1458437
650
4
$a
Operating systems.
$3
3681934
650
4
$a
Integrated circuits.
$3
584067
650
4
$a
Embedded systems.
$2
gtt
$3
1068308
650
4
$a
Wearable computers.
$3
840366
650
4
$a
Design.
$3
518875
650
4
$a
Computer science.
$3
523869
653
$a
Open source software
653
$a
Reverse engineering
690
$a
0389
690
$a
0984
710
2
$a
The Pennsylvania State University.
$3
699896
773
0
$t
Dissertations Abstracts International
$g
83-03B.
790
$a
0176
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28841748
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9470531
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)