Hardware IP Security and Trust
-15%
portes grátis
Hardware IP Security and Trust
Bhunia, Swarup; Mishra, Prabhat; Tehranipoor, Mark
Springer International Publishing AG
07/2018
353
Mole
Inglês
9783319840703
15 a 20 dias
563
Descrição não disponível.
Part I. Introduction.- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs.- PArt II.Trust Analysis.- Chapter 2.Security Rule Check.- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans.- Chapter 4.Code Coverage Analysis for IP Trust Verification.- Chapter 5.Analyzing Circuit Layout to Probing Attack.- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations.- Part III.- Effective Countermeasures.- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation.- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks.- Part IV.- Chapter 9.Validation of IP Security and Trust.- Chapter 10.IP Trust Validation using Proof-carrying Hardware.- Chapter 11. Hardware Trust Verification.- Chapter 12.Verification of Unspecified IP Functionality.- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions.- Chapter 14. Test Generation for Detection of Malicious Parametric Variations.- Part V. Conclusions.- Chapter 15.The Future of Trustworthy SoC Design.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Counterfeit electronics;Integrated circuit authentication;Counterfeit integrated circuit;IC security vulnerabilities;IC design for security;Hardware security and trust
Part I. Introduction.- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs.- PArt II.Trust Analysis.- Chapter 2.Security Rule Check.- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans.- Chapter 4.Code Coverage Analysis for IP Trust Verification.- Chapter 5.Analyzing Circuit Layout to Probing Attack.- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations.- Part III.- Effective Countermeasures.- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation.- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks.- Part IV.- Chapter 9.Validation of IP Security and Trust.- Chapter 10.IP Trust Validation using Proof-carrying Hardware.- Chapter 11. Hardware Trust Verification.- Chapter 12.Verification of Unspecified IP Functionality.- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions.- Chapter 14. Test Generation for Detection of Malicious Parametric Variations.- Part V. Conclusions.- Chapter 15.The Future of Trustworthy SoC Design.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.