Narrow your search

Library

AP (11)

KDG (11)

KU Leuven (10)

Odisee (10)

Thomas More Kempen (10)

Thomas More Mechelen (10)

VIVES (10)

ULB (9)

ULiège (9)

UCLL (7)

More...

Resource type

book (19)

digital (11)


Language

English (25)


Year
From To Submit

2024 (6)

2023 (5)

2021 (4)

2018 (2)

2017 (6)

More...
Listing 1 - 10 of 25 << page
of 3
>>
Sort by

Digital
Emerging Topics in Hardware Security
Author:
ISBN: 9783030644482 9783030644499 9783030644505 9783030644475 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware. Offers a high-level introduction to current hardware security problems; Provides a thorough discussion of a wide variety of emerging topics and technologies (e.g., artificial intelligence, blockchain, and quantum computing) and their applications to hardware security problems; Covers state-of-the-art techniques, as well as ongoing research efforts in emerging technologies in hardware security; Provides guidance and techniques to design and security engineers on protecting their design using emerging technologies.


Book
The hardware Trojan War : attacks, myths, and defenses
Authors: ---
ISBN: 3319685112 3319685104 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Keywords

Engineering. --- Computer software --- Computer security. --- Data encryption (Computer science). --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Data Encryption. --- Electronics and Microelectronics, Instrumentation. --- Performance and Reliability. --- Electron-tube circuits --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Construction --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Reusability. --- Protection --- Security measures --- Electric circuits --- Electron tubes --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Software reengineering --- Generic programming (Computer science) --- Industrial arts --- Technology --- Systems engineering. --- Operating systems (Computers). --- Cryptology. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Computer operating systems --- Disk operating systems --- Systems software --- Design and construction --- Operating systems --- Computer software—Reusability. --- Data encryption (Computer science)


Book
Emerging Topics in Hardware Security
Authors: ---
ISBN: 9783030644482 9783030644499 9783030644505 9783030644475 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
The Hardware Trojan War : Attacks, Myths, and Defenses
Authors: ---
ISBN: 9783319685113 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.


Book
Counterfeit Integrated Circuits : Detection and Avoidance
Authors: --- ---
ISBN: 9783319118246 3319118234 9783319118239 3319118242 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat.   ·      Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; ·      Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; ·      Provides step-by-step solutions for detecting different types of counterfeit ICs; ·      Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.


Book
Hardware IP Security and Trust
Authors: --- ---
ISBN: 3319490257 3319490249 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.


Book
Hardware Security Training, Hands-on!
Authors: --- ---
ISBN: 3031310349 3031310330 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience.


Digital
Hardware IP Security and Trust
Authors: --- ---
ISBN: 9783319490250 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.


Digital
Hardware Protection through Obfuscation
Authors: --- ---
ISBN: 9783319490199 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.


Digital
Counterfeit Integrated Circuits : Detection and Avoidance
Authors: --- ---
ISBN: 9783319118246 9783319118239 9783319118253 9783319364858 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. · Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; · Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; · Provides step-by-step solutions for detecting different types of counterfeit ICs; · Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.

Listing 1 - 10 of 25 << page
of 3
>>
Sort by