TOP
0
0
即日起~6/30,暑期閱讀書展,好書7折起
Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

商品資訊

定價
:NT$ 7650 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
相關商品
商品簡介

商品簡介

Chapter 1: Introduction

(a) Reconfigurable hardware based embedded systems

(b) Importance of Real Time Scheduling for such embedded architectures

(c) Importance of Self Aware Security for such architectures

Chapter 2: Background

(a) Scheduling for embedded real time tasks and limitations of existing techniques

(b) Security related to hardware attacks and limitations of existing techniques

Chapter 3: A novel real-time scheduling for FPGAs having slotted area model

This chapter presents deadline-partition oriented scheduling methodologiesfor periodic hard real-time dynamic task sets on fully and partiallyreconfigurable FPGAs in which the floor of the FPGA is assumed to be statically equi-partitioned into a set of homogeneous tiles such that anyarbitrary task of the given task set may be feasibly mapped into the areaof a given tile.

Chapter 4: A novel real-time scheduling for FPGAs having flexible area model

This chapter presents scheduling methodologies for periodic dependent hard real-time dynamic task sets on fully and partially reconfigurable FPGAs in which the floor of the FPGA follows flexible area model such that any task can be placed anywhere within the floor area. This will work will attempt to solve both the temporal and spatial aspects of the scheduling.

Chapter 5: Denial of Service Attacks for Real Time Scheduling and Related Mitigation Techniques

This chapter presents threat analysis associated with denial of service attacks due to delay inducing hardware trojans in embedded architectures for the scheduling strategies presenteed in Chapter 3 and 4. A self aware security module is also presented that detects and mitigates the threat.

Chapter 6: Erroneous Result Generation Attack for Real Time Scheduling and Related Mitigation Technique

This chapter presents threat analysis associated with generation of erroneous results that may jeopardize the real time task schedules presented in Chapter 3 and 4. Related detection and mitigation techniques are presented alongwith. In addition to this, it is also described how related modifications of the self aware security module can ensure security for the present scenario.

Chapter 7: Conclusion

In this book, we present the importance of real time scheduling for reconfigurable hardware based embedded platforms and related security needs. We present limitations of existing techniques and present some new real time scheduling techniques suitable for the embedded platform. We also focus on how denial of service and erroneous result generation may take place on the real time schedules due to vulnerability of hardware. Related detection and mitigation techniques are discussed, along with description of a self aware module that facilitates detection and mitigation from such threats.

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 7650
若需訂購本書,請電洽客服 02-25006600[分機130、131]。

暢銷榜

客服中心

收藏

會員專區