Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
Cryptography. --- Data encryption (Computer science). --- Electronic circuits. --- Data protection. --- Telecommunication. --- Cryptology. --- Electronic Circuits and Systems. --- Data and Information Security. --- Communications Engineering, Networks. --- Computer security. --- Hardware Trojans (Computers)
Choose an application
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
Logic circuits. --- Logic design. --- Hardware Trojans (Computers) --- Systems engineering. --- Computer science. --- Circuits and Systems. --- Logic Design. --- Arithmetic and Logic Structures. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Electronic circuits. --- Arithmetic and logic units, Computer. --- Arithmetic and logic units, Computer --- Computer arithmetic --- Electronic digital computers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Circuits
Choose an application
This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products. · Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; · Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; · Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; · Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.
Computer architecture. --- Embedded computer systems. --- Microcomputers. --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Embedded systems (Computer systems) --- Architecture, Computer --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Electronic Circuits and Devices. --- Minicomputers --- Computer systems --- Architecture Analysis and Design Language --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Integrated circuits --- Hardware Trojans (Computers) --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Computers --- Hardware verification --- Integrated circuit verification --- Verification of hardware --- Verification of integrated circuits --- Verification --- Defects --- Verification.
Choose an application
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits. Provides a comprehensive vulnerability analysis across the integrated circuits design flow; Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion; Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection; Presents testing techniques for trustworthiness at each circuit level.
Computer security. --- Hardware Trojans (Computers) --- Prevention. --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Protection --- Security measures --- Defects --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics
Choose an application
This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.
Computer viruses. --- Hardware Trojans (Computers) --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Computers --- Defects --- Electronic circuits. --- Computer engineering. --- Internet of things. --- Embedded computer systems. --- Microprocessors. --- Circuits and Systems. --- Cyber-physical systems, IoT. --- Processor Architectures. --- Minicomputers --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Design and construction
Listing 1 - 5 of 5 |
Sort by
|