Narrow your search

Library

KU Leuven (10)

Odisee (10)

Thomas More Kempen (10)

Thomas More Mechelen (10)

VIVES (10)

ULB (9)

ULiège (9)

UCLL (7)

VUB (7)

AP (5)

More...

Resource type

book (19)

digital (5)


Language

English (19)


Year
From To Submit

2024 (5)

2023 (5)

2021 (3)

2018 (1)

2017 (4)

More...
Listing 1 - 10 of 19 << page
of 2
>>
Sort by

Book
The hardware Trojan War : attacks, myths, and defenses
Authors: ---
ISBN: 3319685112 3319685104 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Keywords

Engineering. --- Computer software --- Computer security. --- Data encryption (Computer science). --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Data Encryption. --- Electronics and Microelectronics, Instrumentation. --- Performance and Reliability. --- Electron-tube circuits --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Construction --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Reusability. --- Protection --- Security measures --- Electric circuits --- Electron tubes --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Software reengineering --- Generic programming (Computer science) --- Industrial arts --- Technology --- Systems engineering. --- Operating systems (Computers). --- Cryptology. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Computer operating systems --- Disk operating systems --- Systems software --- Design and construction --- Operating systems --- Computer software—Reusability. --- Data encryption (Computer science)


Book
Emerging Topics in Hardware Security
Authors: ---
ISBN: 9783030644482 9783030644499 9783030644505 9783030644475 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Counterfeit Integrated Circuits : Detection and Avoidance
Authors: --- ---
ISBN: 9783319118246 3319118234 9783319118239 3319118242 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat.   ·      Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; ·      Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; ·      Provides step-by-step solutions for detecting different types of counterfeit ICs; ·      Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.


Book
Hardware IP Security and Trust
Authors: --- ---
ISBN: 3319490257 3319490249 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.


Book
Hardware Security Training, Hands-on!
Authors: --- ---
ISBN: 3031310349 3031310330 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience.


Multi
Physical Assurance : For Electronic Devices and Systems
Authors: --- ---
ISBN: 9783030626099 9783030626105 9783030626112 9783030626082 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with a comprehensive introduction to physical inspection-based approaches for electronics security. The authors explain the principles of physical inspection techniques including invasive, non-invasive and semi-invasive approaches and how they can be used for hardware assurance, from IC to PCB level. Coverage includes a wide variety of topics, from failure analysis and imaging, to testing, machine learning and automation, reverse engineering and attacks, and countermeasures. Provides the first book in the area of physical inspection and assurance for electronics security; Describes opportunities for unique countermeasures, including physical assurance and inspection of electronics, as well as physical fingerprinting based on analog parameters; Enables and categorizes a range of approaches to hardware security.


Multi
Hardware Security Training, Hands-on!
Authors: --- ---
ISBN: 9783031310348 9783031310331 9783031310355 9783031310362 Year: 2023 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience.


Book
Hardware Protection through Obfuscation
Authors: --- ---
Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.


Book
Hardware Protection through Obfuscation
Authors: --- ---
Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.


Book
Materials for Electronics Security and Assurance
Authors: --- ---
ISBN: 0443185433 0443185425 Year: 2024 Publisher: Amsterdam, Netherlands : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 19 << page
of 2
>>
Sort by