TY - BOOK ID - 21605289 TI - Hardware Security and Trust : Design and Deployment of Integrated Circuits in a Threatened Environment AU - Sklavos, Nicolas. AU - Chaves, Ricardo. AU - Di Natale, Giorgio. AU - Regazzoni, Francesco. PY - 2017 SN - 3319443186 331944316X PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Integrated circuits. KW - Computer security. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Security of computer systems KW - Chips (Electronics) KW - Circuits, Integrated KW - Computer chips KW - Microchips KW - Security measures KW - Protection of computer systems KW - Protection KW - Engineering. KW - Microprocessors. KW - Electronics. KW - Microelectronics. KW - Electronic circuits. KW - Circuits and Systems. KW - Processor Architectures. KW - Electronics and Microelectronics, Instrumentation. KW - Data protection KW - Security systems KW - Hacking KW - Electronic circuits KW - Microelectronics KW - Systems engineering. KW - Computer science. KW - Electrical engineering KW - Physical sciences KW - Informatics KW - Science KW - Engineering systems KW - System engineering KW - Engineering KW - Industrial engineering KW - System analysis KW - Design and construction KW - Microminiature electronic equipment KW - Microminiaturization (Electronics) KW - Electronics KW - Microtechnology KW - Semiconductors KW - Miniature electronic equipment KW - Minicomputers KW - Electron-tube circuits KW - Electric circuits KW - Electron tubes UR - https://www.unicat.be/uniCat?func=search&query=sysid:21605289 AB - This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable of detecting faults and resisting fault attacks; Establishes a design and synthesis flow to transform a given circuit into a secure design, incorporating counter-measures against fault attacks. ER -