Fr. 189.00

Introduction to Hardware Security and Trust

English · Hardback

Shipping usually within 6 to 7 weeks

Description

Read more

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures.

List of contents


1. Background on VLSI Testing.- 2. Hardware Implementation of Hash Functions.- 3. RSA: Implementation and Security.- 4. Security based on Physical Unclonability and Disorder.- 5. Hardware Metering: A Survey.- 6. Secure Hardware IPs by Digital Watermark.- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures.- 9. Trusted Design in FPGAs.- 10. Security in Embedded Systems.- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers.- 12. Security for RFID Tags.- 13. Memory Integrity Protection.- 14. Trojan Taxonomy.- 15. Hardware Trojan Detection.-16. Design for Hardware Trust.- 17. Security and Testing.- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.

Summary

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Additional text

From the reviews:
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)

Report

From the reviews:
"Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems ... . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. ... Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it." (Alessandro Berni, ACM Computing Reviews, June, 2012)

Product details

Assisted by Mohamma Tehranipoor (Editor), Mohammad Tehranipoor (Editor), Wang (Editor), Wang (Editor), Cliff Wang (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Hardback
Released 01.10.2011
 
EAN 9781441980793
ISBN 978-1-4419-8079-3
No. of pages 427
Dimensions 156 mm x 243 mm x 27 mm
Weight 772 g
Illustrations VIII, 427 p.
Subjects Natural sciences, medicine, IT, technology > Technology > Electronics, electrical engineering, communications engineering

B, Microprocessors, engineering, Circuits and Systems, Electronics, Microelectronics, Electronics and Microelectronics, Instrumentation, Electronics engineering, Electronic circuits, Electronic Circuits and Systems, Computer architecture & logic design, Processor Architectures

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.