My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art
E-RESOURCE

Title Digital Fingerprinting [electronic resource] / Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera, editors.

Published New York, NY : Springer, 2016.

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (194 p.)
Series Springer English/International eBooks 2016 - Full Set
Notes Description based upon print version of record.
Bibliography Includes bibliographical references and index.
Contents Introduction; 1 Overview; 2 Applications and Requirements of Fingerprints; 3 Types of Fingerprints; Types and Origins of Fingerprints; 1 Introduction; 2 Physical-Layer Device Identification; 2.1 General View; 2.2 Device Under Identification; 2.3 Identification Signals; 2.4 Features; 2.5 Device Fingerprints; 2.6 Physical-Layer Identification System; 2.7 System Performance and Design Issues; 2.8 Improving Physical-Layer Identification Systems; 3 State of the Art; 3.1 Transient-Based Approaches; 3.2 Modulation-Based Approaches; 3.3 Other Approaches
3.4 Attacking Physical-Layer Device Identification3.5 Summary and Conclusion; 4 Future Research Directions; 5 Conclusion; References; Device Measurement and Origin of Variation; 1 Introduction; 1.1 ABCD Parameters; 1.2 Proposed Model; 2 Measuring Parameters; 3 Determining Component Significance; 3.1 Constructing Model Input; 3.2 Producing Model Output; 3.3 Evaluating Model Output; 4 Conclusion; References; Crytpo-Based Methods and Fingerprints; 1 Introduction; 1.1 Authentication; 1.2 Key Generation; 2 Techniques; 2.1 Physical Unclonable Functions; 2.2 Controlled Physical Unclonable Functions
2.3 Clock Skew2.4 Wireless Devices; 2.5 Optical Media; 2.6 Trojan Detection; 2.7 Software Control; 3 Tradeoffs; 3.1 Benefits; 3.2 Drawbacks; 4 Summary; References; Fingerprinting by Design: Embedding and Authentication; 1 Background; 1.1 Intrinsic Fingerprints; 1.2 Fingerprint Embedding; 1.3 Fingerprinting and Communications; 2 Introduction to Embedded Authentication; 3 Framework for Embedded Authentication; 3.1 Authentication System -- Transmitter; 3.2 Authentication System -- Receiver; 3.3 Authentication Performance; 4 Metrics for Embedded Fingerprint Authentication; 4.1 Impact on Data BER
4.2 Authentication Performance4.3 Security Analysis; 4.4 Complexity; 5 Experimental Results; 5.1 Authentication Performance; 5.2 Key Equivocation; 5.3 Impact on Data BER; 6 Conclusions; References; Digital Fingerprint: A Practical Hardware Security Primitive; 1 Introduction; 2 Digital Fingerprinting for IP Protection; 2.1 Background on Fingerprinting; 2.2 The Need and Challenge of Digital Fingerprinting IPs; 2.3 Requirements of Digital Fingerprinting; 2.4 Iterative Fingerprinting Techniques; 2.5 Fingerprinting with Constraint-Addition; 3 Observability Don't Care Fingerprinting
3.1 Illustrative Example3.2 Observability Don't Care Conditions; 3.3 Finding Locations for Circuit Modification Based on ODCs; 3.4 Determining Potential Fingerprinting Modifications; 3.5 Maintaining Overhead Constraints; 3.6 Security Analysis; 4 Satisfiability Don't Care Fingerprinting; 4.1 Satisfiability Don't Care and Illustrative Example; 4.2 Assumptions for SDC Based Fingerprinting; 4.3 SDC Based Fingerprinting Technique; 4.4 Fingerprint Embedding Scheme; 4.5 Security Analysis; 5 Scan Chain Fingerprinting; 5.1 Illustrative Example; 5.2 Basics on Scan Chain Design
Notes 5.3 Scan Chain Fingerprinting
Summary This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference.
Other author Wang, Cliff.
Gerdes, Ryan M.
Guan, Yong.
Kasera, Sneha Kumar.
SpringerLink issuing body.
Subject Data encryption (Computer science)
Cryptography.
Electronic books.
ISBN 9781493966011 (electronic bk.)
1493966014 (electronic bk.)
9781493965991
1493965999