Use coupon code “MARCH20” for a 20% discount on all items! Valid until 31-03-2025

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Principles of Secure Processor Architecture Design

      1 in stock

      Firm sale: non returnable item
      SKU 9781681734040 Categories ,
      Select Guide Rating
      Provides insights into the principles behind the design of academic and commercial secure processor architectures. This book presents the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware secur...

      £98.00

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781681734040
      Product Form:Hardback
      Country of Manufacture:US
      Series:Synthesis Lectures on Computer Architecture
      Title:Principles of Secure Processor Architecture Design
      Authors:Author: Jakub Szefer, Margaret Martonosi
      Page Count:173
      Subjects:Information technology: general topics, Information technology: general issues, Computer hardware, Computer security, Computer architecture and logic design, Computer hardware, Computer security, Computer architecture & logic design
      Description:Select Guide Rating
      Provides insights into the principles behind the design of academic and commercial secure processor architectures. This book presents the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry.

      With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today''s processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered).

      This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.


      Imprint Name:Morgan & Claypool Publishers
      Publisher Name:Morgan & Claypool Publishers
      Country of Publication:GB
      Publishing Date:2018-10-30

      Additional information

      Weight536 g
      Dimensions201 × 245 × 17 mm