000 03656nam a22004695i 4500
001 978-1-4419-8080-9
003 DE-He213
005 20140220083233.0
007 cr nn 008mamaa
008 110920s2012 xxu| s |||| 0|eng d
020 _a9781441980809
_9978-1-4419-8080-9
024 7 _a10.1007/978-1-4419-8080-9
_2doi
050 4 _aTK7888.4
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
082 0 4 _a621.3815
_223
100 1 _aTehranipoor, Mohammad.
_eeditor.
245 1 0 _aIntroduction to Hardware Security and Trust
_h[electronic resource] /
_cedited by Mohammad Tehranipoor, Cliff Wang.
264 1 _aNew York, NY :
_bSpringer New York,
_c2012.
300 _aVIII, 427 p. 174 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1. Background on VLSI Testing -- 2. Hardware Implementation of Hash Functions -- 3. RSA: Implementation and Security -- 4. Security based on Physical Unclonability and Disorder -- 5. Hardware Metering: A Survey -- 6. Secure Hardware IPs by Digital Watermark -- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures -- 9. Trusted Design in FPGAs -- 10. Security in Embedded Systems -- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers -- 12. Security for RFID Tags -- 13. Memory Integrity Protection -- 14. Trojan Taxonomy -- 15. Hardware Trojan Detection.-16. Design for Hardware Trust -- 17. Security and Testing -- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.
520 _aThe emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures. Provides a comprehensive introduction to hardware security and trust; Includes coverage at the circuit and systems levels, with applications to design and implementation; Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.
650 0 _aEngineering.
650 0 _aComputer science.
650 0 _aElectronics.
650 0 _aSystems engineering.
650 1 4 _aEngineering.
650 2 4 _aCircuits and Systems.
650 2 4 _aElectronics and Microelectronics, Instrumentation.
650 2 4 _aProcessor Architectures.
700 1 _aWang, Cliff.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781441980793
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4419-8080-9
912 _aZDB-2-ENG
999 _c100553
_d100553