Introduction -- Conterfeit Integrated Circuits -- Counterfeit Defects -- Physical Tests for Counterfeit Detection -- Electrical Tests for Counterfeit Detection -- Counterfeit Test Coverage: An Assessment of Current Counterfeit Detection Methods -- Advanced Detection: Physical Tests -- Advanced Detec
Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection
โ Scribed by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang (auth.)
- Publisher
- Springer International Publishing
- Year
- 2014
- Tongue
- English
- Leaves
- 236
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.
โฆ Table of Contents
Front Matter....Pages i-xvi
Introduction....Pages 1-18
Hardware Trojan Detection: Untrusted Third-Party IP Cores....Pages 19-30
Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits....Pages 31-38
Design for Hardware Trust: Dummy Scan Flip-Flop Insertion....Pages 39-67
Design for Hardware Trust: Layout-Aware Scan Cell Reordering....Pages 69-90
Design for Hardware Trust: Ring Oscillator Network....Pages 91-124
Design Vulnerability Analysis....Pages 125-145
Trojan Prevention: Built-In Self-Authentication....Pages 147-160
Counterfeit ICs: Taxonomies, Assessment, and Challenges....Pages 161-178
Counterfeit ICs: Detection and Prevention of Recycled ICs Using On-Chip Sensors....Pages 179-205
Counterfeit ICs: Path-Delay Fingerprinting....Pages 207-220
Back Matter....Pages 221-222
โฆ Subjects
Circuits and Systems;Processor Architectures;Electronic Circuits and Devices
๐ SIMILAR VOLUMES
<p><p>This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits
<p>The history of this book begins way back in 1982. At that time a research proposal was filed with the Dutch Foundation for Fundamental Research on Matter concerning research to model defects in the layer structure of integrated circuits. It was projected that the results may be useful for yield e