Deep learning for computational problems in hardware security : modeling attacks on strong physically unclonable function circuits / Pranesh Santikellur and Rajat Subhra Chakraborty.
Series: Studies in Computational Intelligence ; v. 1052Publication details: Singapore: Springer, ©2021,Description: xi, 84pISBN:- 9789811940163
- 005.82 Â SanD
| Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Books
|
Indian Institute of Technology Tirupati General Stacks | Electrical | 005.82 SanD (11636) (Browse shelf(Opens below)) | Available | 11636 |
Browsing Indian Institute of Technology Tirupati shelves, Shelving location: General Stacks, Collection: Electrical Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.7 AhmD (12232) Data Analytics : Concepts, Techniques, and Applications / | 005.71 EDU SYNTHESIZABLE VHDL DESIGN FOR FPGAs | 005.74 OLI CLOUD COMPUTING WITH E-SCIENCE APPLICATIONS | 005.82 SanD (11636) Deep learning for computational problems in hardware security : modeling attacks on strong physically unclonable function circuits / | 006.22 ALB Embedded systems development : from functional models to implementations | 006.22 ALU/P Principles of Cyber Physical Systems | 006.22 ALU/P Principles of Cyber Physical Systems |
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.
There are no comments on this title.