Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware. Offers a high-level introduction to current hardware security problems; Provides a thorough discussion of a wide variety of emerging topics and technologies (e.g., artificial intelligence, blockchain, and quantum computing) and their applications to hardware security problems; Covers state-of-the-art techniques, as well as ongoing research efforts in emerging technologies in hardware security; Provides guidance and techniques to design and security engineers on protecting their design using emerging technologies.
Choose an application
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.
Engineering. --- Computer software --- Computer security. --- Data encryption (Computer science). --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Data Encryption. --- Electronics and Microelectronics, Instrumentation. --- Performance and Reliability. --- Electron-tube circuits --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Construction --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Reusability. --- Protection --- Security measures --- Electric circuits --- Electron tubes --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Software reengineering --- Generic programming (Computer science) --- Industrial arts --- Technology --- Systems engineering. --- Operating systems (Computers). --- Cryptology. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Computer operating systems --- Disk operating systems --- Systems software --- Design and construction --- Operating systems --- Computer software—Reusability. --- Data encryption (Computer science)
Choose an application
Choose an application
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.
Electronics --- Electrical engineering --- Applied physical engineering --- Production management --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- betrouwbaarheid --- cryptografie --- informatica --- elektronica --- computerbeveiliging --- OS (operating system) --- ingenieurswetenschappen --- elektrische circuits
Choose an application
This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. · Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; · Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; · Provides step-by-step solutions for detecting different types of counterfeit ICs; · Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.
Engineering. --- Circuits and Systems. --- Processor Architectures. --- Electronic Circuits and Devices. --- Computer science. --- Systems engineering. --- Ingénierie --- Informatique --- Ingénierie des systèmes --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Integrated circuits --- Product counterfeiting. --- Testing. --- Verification. --- Commercial product counterfeiting --- Counterfeiting of products --- Passing off (Product counterfeiting) --- Hardware verification --- Integrated circuit verification --- Verification of hardware --- Verification of integrated circuits --- Microprocessors. --- Electronic circuits. --- Counterfeits and counterfeiting --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Informatics --- Science --- Design and construction --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics
Choose an application
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
Engineering. --- Microprocessors. --- Computer security. --- Data encryption (Computer science). --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Data Encryption. --- Systems and Data Security. --- Electronics and Microelectronics, Instrumentation. --- Processor Architectures. --- Computer networks --- Management. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Minicomputers --- Construction --- Industrial arts --- Technology --- Protection --- Security measures --- Systems engineering. --- Computer science. --- Cryptology. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction
Choose an application
This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience.
Electronic circuits. --- Embedded computer systems. --- Electronic circuit design. --- Electronic Circuits and Systems. --- Embedded Systems. --- Electronics Design and Verification. --- Electronic circuits --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Design
Choose an application
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
Electronics --- Electrical engineering --- Applied physical engineering --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- computers --- informatica --- elektronica --- computerbeveiliging --- ingenieurswetenschappen --- computerkunde --- architectuur (informatica) --- elektrische circuits
Choose an application
This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.
Electronics --- Electrical engineering --- Applied physical engineering --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- computers --- informatica --- elektronica --- ingenieurswetenschappen --- computerkunde --- architectuur (informatica) --- elektrische circuits
Choose an application
This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. · Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; · Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; · Provides step-by-step solutions for detecting different types of counterfeit ICs; · Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.
Electronics --- Electrical engineering --- Computer architecture. Operating systems --- microprocessoren --- architectuur (informatica) --- elektrische circuits
Listing 1 - 10 of 25 | << page >> |
Sort by
|