Machine Learning for Embedded System Security Machine Learning for Embedded System Security

Machine Learning for Embedded System Security

    • €87.99
    • €87.99

Publisher Description

This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. 

       Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning;

 Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans;

       Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs);

 It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems.

GENRE
Computing & Internet
RELEASED
2022
22 April
LANGUAGE
EN
English
LENGTH
175
Pages
PUBLISHER
Springer International Publishing
SIZE
16.7
MB

More Books Like This

Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
2022
Proceedings of the International Conference on Big Data, IoT, and Machine Learning Proceedings of the International Conference on Big Data, IoT, and Machine Learning
2021

More Books by Basel Halak

Algorithms and VLSI Implementations of MIMO Detection Algorithms and VLSI Implementations of MIMO Detection
2022
Hardware Supply Chain Security Hardware Supply Chain Security
2021
Authentication of Embedded Devices Authentication of Embedded Devices
2021
Ageing of Integrated Circuits Ageing of Integrated Circuits
2019
Physically Unclonable Functions Physically Unclonable Functions
2018