The Hardware Trojan War [electronic resource] : Attacks, Myths, and Defenses / edited by Swarup Bhunia, Mark M. Tehranipoor.

Colaborador(es): Bhunia, Swarup [editor.] | Tehranipoor, Mark M [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoEditor: Cham : Springer International Publishing : Imprint: Springer, 2018Edición: 1st ed. 2018Descripción: VIII, 389 p. 189 illus., 154 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783319685113Tema(s): Electronic circuits | Computer security | Data encryption (Computer science) | Electronics | Microelectronics | Computer software-Reusability | Circuits and Systems | Systems and Data Security | Cryptology | Electronics and Microelectronics, Instrumentation | Performance and ReliabilityFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 621.3815 Clasificación LoC:TK7888.4Recursos en línea: Libro electrónicoTexto
Contenidos:
Part I. Hardware Trojan Preliminaries -- Chapter 1.Introduction -- Chapter 2.Introduction to Hardware Trojans -- Part II. Hardware Trojan attacks: Threat Analysis -- Chapter 3.Hardware Trojan Attacks in SoC and NoC -- Chapter 4. Hardware IP Trust -- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs -- Chapter 6. Hardware Trojans and Piracy of PCBs -- Part III. Detection-Logic Testing -- Chapter 7. Logic Testing for Hardware Trojan Detection -- Chapter 8. Formal Approaches to Hardware Trust Verification -- Chapter 9. Golden-free Trojan Detection -- Part IV-Detection-Side Channel analysis -- Chapter 10. Detecting Hardware Trojans using Delay Analysis -- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection -- Part VI. Emerging Trent, Inductrial Practices, New Attacks -- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges -- Chapter 16.Conclusion and Future Work.
En: Springer Nature eBookResumen: This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

Part I. Hardware Trojan Preliminaries -- Chapter 1.Introduction -- Chapter 2.Introduction to Hardware Trojans -- Part II. Hardware Trojan attacks: Threat Analysis -- Chapter 3.Hardware Trojan Attacks in SoC and NoC -- Chapter 4. Hardware IP Trust -- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs -- Chapter 6. Hardware Trojans and Piracy of PCBs -- Part III. Detection-Logic Testing -- Chapter 7. Logic Testing for Hardware Trojan Detection -- Chapter 8. Formal Approaches to Hardware Trust Verification -- Chapter 9. Golden-free Trojan Detection -- Part IV-Detection-Side Channel analysis -- Chapter 10. Detecting Hardware Trojans using Delay Analysis -- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection -- Part VI. Emerging Trent, Inductrial Practices, New Attacks -- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges -- Chapter 16.Conclusion and Future Work.

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

UABC ; Temporal ; 01/01/2021-12/31/2023.

Con tecnología Koha