Narrow your search

Library

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

VIVES (8)

KU Leuven (7)

Odisee (7)

ULiège (7)

ULB (6)

LUCA School of Arts (2)

UGent (2)

More...

Resource type

book (8)

digital (1)


Language

English (8)


Year
From To Submit

2023 (1)

2020 (2)

2018 (1)

2014 (2)

2012 (1)

More...
Listing 1 - 8 of 8
Sort by

Book
Integrated circuit authentication : hardware trojans and counterfeit detection
Authors: --- ---
ISBN: 3319008153 3319008161 9783319008158 Year: 2014 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with a comprehensive introduction to hardware Trojans.  The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products.   ·         Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; ·         Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; ·         Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; ·         Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.


Book
Trusted Digital Circuits : Hardware Trojan Vulnerabilities, Prevention and Detection
Author:
ISBN: 3319790811 3319790803 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits. Provides a comprehensive vulnerability analysis across the integrated circuits design flow; Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion; Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection; Presents testing techniques for trustworthiness at each circuit level.


Book
Viruses, Hardware and Software Trojans : Attacks and Countermeasures
Authors: ---
ISBN: 3030472183 3030472175 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.


Book
Understanding Analog Side Channels Using Cryptography Algorithms
Authors: ---
ISBN: 3031385799 3031385780 Year: 2023 Publisher: Cham, Switzerland : Springer Nature Switzerland AG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.


Multi
Integrated circuit authentication : hardware trojans and counterfeit detection
Authors: --- ---
ISBN: 9783319008165 3319008161 Year: 2014 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with a comprehensive introduction to hardware Trojans.  The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products.   ·         Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; ·         Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; ·         Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; ·         Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.


Book
Les Troyens : The Trojans : opera in French in five acts
Authors: --- ---
ISBN: 0984559965 9780984559961 Year: 2012 Publisher: [Miami, Fla.] : Opera Journeys Pub.,


Book
Trustworthy Hardware Design: Combinational Logic Locking Techniques
Authors: --- ---
ISBN: 3030153347 3030153339 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.

Shakespeare's Troy : drama, politics, and the translation of empire
Author:
ISBN: 9780511581960 9780521592239 9780521033787 0585033803 9780585033808 0521592232 9780511000782 0511000782 0521592232 0511824165 9780511824166 0511581963 0521033780 Year: 1997 Volume: 22 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Heather James examines the ways in which Shakespeare handles the inheritance and transmission of the Troy legend. She argues that Shakespeare's use of Virgil, Ovid and other classical sources demonstrates the appropriation of classical authority in the interests of developing a national myth, and goes on to distinguish Shakespeare's deployment of the myth from 'official' Tudor and Stuart ideology. James traces Shakespeare's reworking of the myth in Troilus and Cressida, Antony and Cleopatra, Cymbeline and The Tempest, and shows how the legend of Troy in Queen Elizabeth's day differed from that in the time of King James. The larger issue the book confronts is the directly political one of the way in which Shakespeare's textual appropriations participate in the larger cultural project of finding historical legitimation for a realm that was asserting its status as an empire.

Keywords

Politics and literature --- Political plays, English --- Troilus (Legendary character) in literature. --- Trojan War --- English drama --- Imperialism in literature. --- Trojans in literature. --- Myth in literature. --- History --- History and criticism. --- Literature and the war. --- Roman influences. --- Shakespeare, William, --- Troy (Extinct city) --- In literature. --- Political and social views. --- Shakespeare, William --- Shakespear, William, --- Shakspeare, William, --- Šekʻspiri, Uiliam, --- Saixpēr, Gouilliam, --- Shakspere, William, --- Shikisbīr, Wilyam, --- Szekspir, Wiliam, --- Šekspyras, --- Shekspir, Vilʹi︠a︡m, --- Šekspir, Viljem, --- Tsikinya-chaka, --- Sha-shih-pi-ya, --- Shashibiya, --- Sheḳspir, Ṿilyam, --- Shaḳspir, Ṿilyam, --- Syeiksŭpʻio, --- Shekspir, V. --- Szekspir, William, --- Shakespeare, Guglielmo, --- Shake-speare, William, --- Sha-ō, --- Şekspir, --- Shekspir, Uiliam, --- Shekspir, U. --- Šekspir, Vilijam, --- Ṣēkspiyar, Viliyam, --- Shakspir, --- Shekspyr, Vyli︠e︡m, --- Şekspir, Velyam, --- Ṣēkspiyar, Villiyam, --- Shēkʻspʻiyr, Vlilliam, --- Ṣēkspiyar, --- Ṣēkspiyar Mahākavi, --- Ṣēkspiyar Mahākaviya, --- Sheḳspier, Ṿilyam, --- Shēkʻspir, --- Shakespeare, --- Śeksper, --- Шекспир, Вильям, --- Шекспир, Уильям, --- שייקספיר, וויליאם, --- שייקספיר, וו., --- שיקספיר, וויליאם --- שיקספיר, ויליאם --- שיקספיר, ויליאם, --- שכספיר, ויליאם, --- שכספיר, וילים, --- שכספיר, ו׳ --- שעפקספיר, וויליאם, --- שעקספיער, וויליאם --- שעקספיער, וויליאם, --- שעקספיער, ווילליאם --- שעקספיער, וו., --- שעקספיר --- שעקספיר, וו --- שעקספיר, וויליאם, --- שעקספיר, וויליאמ --- שעקספיר, ווילליאם --- שעקספיר, ווילליאם, --- שעקספיר, וו., --- שעקספיר, װיליאם, --- שעקספיר, װילליאם, --- שעקספיר, װ., --- שעקספער --- שעקספער, וויליאמ --- שקספיר --- שקספיר, וו --- שקספיר, וויליאם --- שקספיר, וויליאם, --- שקספיר, ווילים, --- שקספיר, וילאם --- שקספיר, ויליאם --- שקספיר, ויליאם, --- שקספיר, ויליים, --- שקספיר, וילים --- שקספיר, וילים, --- شاكسبير، وليم --- شاكسپير، وليم --- شكسبير، وليام --- شكسبير، وليم --- شكسبير، وليم، --- شكسبير، و. --- شكسپير، وليم --- شكسپير، ويليام --- شيكسبير، وليام --- شيكسبير، وليام.، --- شيكسبير، وليم --- شکسبير، وليم --- وليم شکسبير --- 沙士北亞威廉姆, --- 沙士比亞威廉姆, --- 莎士比亞威廉姆, --- 莎士比亞威廉, --- 莎士比亞, --- Arts and Humanities --- Literature

Listing 1 - 8 of 8
Sort by