Online Library TheLib.net » Introduction to Hardware Security and Trust
cover of the book Introduction to Hardware Security and Trust

Ebook: Introduction to Hardware Security and Trust

00
27.01.2024
0
0

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.




The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.

  • Provides a comprehensive introduction to hardware security and trust;
  • Includes coverage at the circuit and systems levels, with applications to design and implementation;
  • Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.



The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.

  • Provides a comprehensive introduction to hardware security and trust;
  • Includes coverage at the circuit and systems levels, with applications to design and implementation;
  • Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.

Content:
Front Matter....Pages i-viii
Background on VLSI Testing....Pages 1-25
Hardware Implementation of Hash Functions....Pages 27-50
RSA: Implementation and Security....Pages 51-64
Security Based on Physical Unclonability and Disorder....Pages 65-102
Hardware Metering: A Survey....Pages 103-122
Secure Hardware IPs by Digital Watermark....Pages 123-141
Physical Attacks and Tamper Resistance....Pages 143-173
Side Channel Attacks and Countermeasures....Pages 175-194
Trusted Design in FPGAs....Pages 195-229
Security in Embedded Systems....Pages 231-261
Side-Channel Attacks and Countermeasures for Embedded Microcontrollers....Pages 263-282
Security for RFID Tags....Pages 283-303
Memory Integrity Protection....Pages 305-324
Trojan Taxonomy....Pages 325-338
Hardware Trojan Detection....Pages 339-364
Design for Hardware Trust....Pages 365-384
Security and Testing....Pages 385-409
Protecting IPs Against Scan-Based Side-Channel Attacks....Pages 411-427


The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.

  • Provides a comprehensive introduction to hardware security and trust;
  • Includes coverage at the circuit and systems levels, with applications to design and implementation;
  • Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.

Content:
Front Matter....Pages i-viii
Background on VLSI Testing....Pages 1-25
Hardware Implementation of Hash Functions....Pages 27-50
RSA: Implementation and Security....Pages 51-64
Security Based on Physical Unclonability and Disorder....Pages 65-102
Hardware Metering: A Survey....Pages 103-122
Secure Hardware IPs by Digital Watermark....Pages 123-141
Physical Attacks and Tamper Resistance....Pages 143-173
Side Channel Attacks and Countermeasures....Pages 175-194
Trusted Design in FPGAs....Pages 195-229
Security in Embedded Systems....Pages 231-261
Side-Channel Attacks and Countermeasures for Embedded Microcontrollers....Pages 263-282
Security for RFID Tags....Pages 283-303
Memory Integrity Protection....Pages 305-324
Trojan Taxonomy....Pages 325-338
Hardware Trojan Detection....Pages 339-364
Design for Hardware Trust....Pages 365-384
Security and Testing....Pages 385-409
Protecting IPs Against Scan-Based Side-Channel Attacks....Pages 411-427
....
Download the book Introduction to Hardware Security and Trust for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen