×







We sell 100% Genuine & New Books only!

Principles of Secure Processor Architecture Design at Meripustak

Principles of Secure Processor Architecture Design by Jakub Szefer, Series Margaret Martonosi , Morgan

Books from same Author: Jakub Szefer, Series Margaret Martonosi

Books from same Publisher: Morgan

Related Category: Author List / Publisher List


  • Price: ₹ 13051.00/- [ 7.00% off ]

    Seller Price: ₹ 12137.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Jakub Szefer, Series Margaret Martonosi
    PublisherMorgan
    ISBN9781681730011
    Pages173
    BindingPaperback
    LanguageEnglish
    Publish YearOctober 2018

    Description

    Morgan Principles of Secure Processor Architecture Design by Jakub Szefer, Series Margaret Martonosi

    This book presents the different challenges of secure processor architecture design for architects working in industry who want to add security features to their designs as well as graduate students interested in research on architecture and hardware security._x000D__x000D_It educates readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, it presents numerous design suggestions, as well as discussing pitfalls and fallacies that designers should avoid._x000D__x000D_With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book gives readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered)._x000D_ Table of contents :- _x000D_ Preface_x000D_ Acknowledgments_x000D_ Introduction_x000D_ Basic Computer Security Concepts_x000D_ Secure Processor Architectures_x000D_ Trusted Execution Environments_x000D_ Hardware Root of Trust_x000D_ Memory Protections_x000D_ Multiprocessor and Many-Core Protections_x000D_ Side-Channel Threats and Protections_x000D_ Security Verification of Processor Architectures_x000D_ Principles of Secure Processor Architecture Design_x000D_ Bibliography_x000D_ Online Resources_x000D_ Author's Biography_x000D_



    Book Successfully Added To Your Cart