<p>This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSP
Introduction to Hardware Security and Trust
โ Scribed by Junxia Ma, Mohammad Tehranipoor (auth.), Mohammad Tehranipoor, Cliff Wang (eds.)
- Publisher
- Springer-Verlag New York
- Year
- 2012
- Tongue
- English
- Leaves
- 436
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern societyโs microelectronic-supported infrastructures.
โฆ Table of Contents
Front Matter....Pages i-viii
Background on VLSI Testing....Pages 1-25
Hardware Implementation of Hash Functions....Pages 27-50
RSA: Implementation and Security....Pages 51-64
Security Based on Physical Unclonability and Disorder....Pages 65-102
Hardware Metering: A Survey....Pages 103-122
Secure Hardware IPs by Digital Watermark....Pages 123-141
Physical Attacks and Tamper Resistance....Pages 143-173
Side Channel Attacks and Countermeasures....Pages 175-194
Trusted Design in FPGAs....Pages 195-229
Security in Embedded Systems....Pages 231-261
Side-Channel Attacks and Countermeasures for Embedded Microcontrollers....Pages 263-282
Security for RFID Tags....Pages 283-303
Memory Integrity Protection....Pages 305-324
Trojan Taxonomy....Pages 325-338
Hardware Trojan Detection....Pages 339-364
Design for Hardware Trust....Pages 365-384
Security and Testing....Pages 385-409
Protecting IPs Against Scan-Based Side-Channel Attacks....Pages 411-427
โฆ Subjects
Circuits and Systems; Electronics and Microelectronics, Instrumentation; Processor Architectures
๐ SIMILAR VOLUMES
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the sec
<p><em><strong>Nanoelectronic Devices for Hardware and Software Security</strong></em> has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research direction