Hardware Trojan War

Hardware Trojan War

Attacks, Myths, and Defenses

Tehranipoor, Mark M.; Bhunia, Swarup

Springer International Publishing AG

09/2018

389

Mole

Inglês

9783319886145

15 a 20 dias

611

Descrição não disponível.
Part I. Hardware Trojan Preliminaries.- Chapter 1.Introduction.- Chapter 2.Introduction to Hardware Trojans.- Part II. Hardware Trojan attacks: Threat Analysis.- Chapter 3.Hardware Trojan Attacks in SoC and NoC.- Chapter 4. Hardware IP Trust.- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs.- Chapter 6. Hardware Trojans and Piracy of PCBs.- Part III. Detection-Logic Testing.- Chapter 7. Logic Testing for Hardware Trojan Detection.- Chapter 8. Formal Approaches to Hardware Trust Verification.- Chapter 9. Golden-free Trojan Detection.- Part IV-Detection-Side Channel analysis.- Chapter 10. Detecting Hardware Trojans using Delay Analysis.- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection.- Part VI. Emerging Trent, Inductrial Practices, New Attacks.- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges.- Chapter 16.Conclusion and Future Work.
Counterfeit electronics;Counterfeit integrated circuit;Hardware Trojan Attacks;Trust Verification of ICs;Hardware Obfuscation;Hardware security and trust