• Complain

Krishnendu Guha - Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

Here you can read online Krishnendu Guha - Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Krishnendu Guha Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.

Krishnendu Guha: author's other books


Who wrote Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms? Find out the surname, the name of the author of the book and a list of all author's works by series.

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Self Aware Security for Real Time Task Schedules in - photo 1
Book cover of Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms
Krishnendu Guha , Sangeet Saha and Amlan Chakrabarti
Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms
1st ed. 2021
Logo of the publisher Krishnendu Guha A K Choudhury School of - photo 2
Logo of the publisher
Krishnendu Guha
A. K. Choudhury School of Information Technology (AKCSIT), University of Calcutta, Kolkata, West Bengal, India
Sangeet Saha
School of Computer Science and Electronic Engineering (CSEE), University of Essex, Colchester, UK
Amlan Chakrabarti
A. K. Choudhury School of Information Technology (AKCSIT), University of Calcutta, Kolkata, West Bengal, India
ISBN 978-3-030-79700-3 e-ISBN 978-3-030-79701-0
https://doi.org/10.1007/978-3-030-79701-0
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

To our Families

Preface

Security is of prime importance since times immemorial. However, the nature of security changes with the demand of industry. Industry 1.0 was associated with mechanization, steam power, weaving machines, etc., where the security objective was to prevent mechanical damage of system components. Industry 2.0 witnessed the use of electrical energy for mass production and distribution of products. Along with the security needs of Industry 1.0, the concept of securing the physical supply chain was a key aspect at this time. With Industry 3.0, the digital era started, where electronics and information technology were used to enhance automation. Though systems were automated, yet human input and intervention were needed. Security from intentional attacks gained importance in this era. However, the key focus was associated with software security and hardware was considered trusted. Presently, we are in Industry 4.0, which is the era of smart machines. This era features cyber-physical systems (CPSs) and internet of things (IoTs). With the aid of artificial intelligence (AI) and machine learning (ML), devices can communicate and interact with each other, trigger actions and even control one another without the aid of human support. To enhance speed of operations and eliminate attacks related to software, direct task execution on hardware was seen. However, on the flip side, the era has witnessed hardware threats. Thus, the security need in this domain is not only confined to software and network security but also hardware security.

Moreover, this era has witnessed the advent of field-programmable gate arrays (FPGAs) that are more flexible and replaces the traditional application-specific integrated circuits (ASICs), which are rigid. The property of dynamic partial reconfiguration of FPGAs facilitate spatial and temporal scheduling and execution of various tasks in the same platform. Thus, FPGAs find usage in a wide range of applications from simple smart home appliances to complex nuclear plants. As several user tasks with varied deadlines have to be executed in a certain interval of time, FPGA-based real-time task schedules are generated. Ensuring security for such FPGA-based real-time task schedules is of key importance. But like ASICs, real-time task operations in FPGAs can also be affected due to hardware attacks. Hence, security for real-time FPGA-based task operations is of utmost importance.

Hardware security is an arena that has been extensively researched for about two decades. This field gained significant momentum from 2005 when the US Government of Defence recognized hardware trojans as a significant threat to mission-critical applications. This arena was not only confined to research but has also been incorporated into various undergraduate and graduate courses. Moreover, with the cases of Meltdown and Spectre vulnerabilities in various microprocessors that are available in the electronics market, professionals who are associated with design and development of computing systems and their associated security have taken a keen interest in this arena of hardware security. However, the study on how hardware attacks may affect real-time task schedules is yet in its infancy. Not only detecting such vulnerability but also knowing the mechanisms of how such real-time task schedules can be protected from hardware attacks at runtime is of importance.

All species try to survive in nature and in this process, they exhibit a certain degree of self-awareness, based on which they counteract the various dangers and threats. Self-awareness (with respect to security) can be described as the ability of an individual to recognize itself in a complex environment, monitor or perceive the changes ongoing in the surrounding environment, decipher its course of action and finally, take an appropriate action to secure itself from the threat and survive in the environment. Based on this observe-decide-act mechanism, several on-chip self-aware security techniques were proposed in past works. However, the arena of self-aware security strategies that can secure real-time task schedules from hardware attacks is yet in its infancy and needs extensive study. Thus, the study of hardware security is incomplete, unless the effects of hardware attacks on real-time task schedules and its related self-aware security strategies are studied.

This book provides an extensive study on the latest FPGA-based scheduling strategies and how these can be affected due to hardware attacks. Along with these, self-aware security mechanisms for counteracting such threats at runtime are also presented in this book. This book will add on to the knowledge that are available in the existing books on real-time scheduling on reconfigurable hardware platforms and hardware security. This book will be useful to readers at all levels, be it students, research scholars, academicians or industry professionals, as it will serve to fill up the gaps in the existing knowledge on real-time scheduling on reconfigurable platforms and hardware security.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms»

Look at similar books to Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms»

Discussion, reviews of the book Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.