The book commences with an introductory section on reconfigurable computing and thereafter delves into its applications in critical infrastructures. This book analyzes how such systems may be affected due to vulnerabilities and also discusses how these can be attacked by adversaries or cybercriminals. This book also discusses protection mechanisms related to such threats. It initially starts with an introduction to the various industrial revolutions and the changes in security needs, followed by a basic description of reconfigurable hardware based critical infrastructures. Further, the book contains discussion on security administration and planning, auditing, monitoring and analysis, risk-response and recovery, control and countermeasures highlighting their need in reconfigurable hardware-based platforms. In addition to these, new concepts are introduced such as AI/ML for cybersecurity, digital forensics related to reconfigurable hardware based critical infrastructures. Finally, a hands on learning experience is presented to provide the readers with a practical flavour.
The book will be useful to students (graduate and undergraduate), researchers, academicians and industry professionals.