Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environment /

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given ci...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Sklavos, Nicolas. (Editor, http://id.loc.gov/vocabulary/relators/edt), Chaves, Ricardo. (Editor, http://id.loc.gov/vocabulary/relators/edt), Di Natale, Giorgio. (Editor, http://id.loc.gov/vocabulary/relators/edt), Regazzoni, Francesco. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edition:1st ed. 2017.
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-44318-8
LEADER 04369nam a22005415i 4500
001 978-3-319-44318-8
003 DE-He213
005 20210617001808.0
007 cr nn 008mamaa
008 170113s2017 gw | s |||| 0|eng d
020 |a 9783319443188  |9 978-3-319-44318-8 
024 7 |a 10.1007/978-3-319-44318-8  |2 doi 
050 4 |a TK7888.4 
072 7 |a TJFC  |2 bicssc 
072 7 |a TEC008010  |2 bisacsh 
072 7 |a TJFC  |2 thema 
082 0 4 |a 621.3815  |2 23 
245 1 0 |a Hardware Security and Trust  |h [electronic resource] :  |b Design and Deployment of Integrated Circuits in a Threatened Environment /  |c edited by Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni. 
250 |a 1st ed. 2017. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a X, 254 p. 99 illus., 47 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a AES Datapaths on FPGAs: a State of the Art Analysis -- Fault Attacks, Injection Techniques and Tools for Simulation -- Recent developments in side-channel analysis on Elliptic Curve Cryptography implementations -- Practical Session: Differential Power Analysis for Beginners -- Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems -- Scan Design: Basics, Advancements and Vulnerabilities -- Manufacturing Testing & Security Countermeasures -- Malware Threats and Solutions for Trustworthy Mobile Systems Design -- Ring Oscillators and Hardware Trojan Detection -- Notions on Silicon Physically Unclonable Functions -- Implementation of delay-based PUFs on Altera FPGAs -- Implementation and Analysis of Ring Oscillator Circuits on Xilinx FPGAs.-. 
520 |a This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable of detecting faults and resisting fault attacks; Establishes a design and synthesis flow to transform a given circuit into a secure design, incorporating counter-measures against fault attacks. 
650 0 |a Electronic circuits. 
650 0 |a Microprocessors. 
650 0 |a Electronics. 
650 0 |a Microelectronics. 
650 1 4 |a Circuits and Systems.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T24068 
650 2 4 |a Processor Architectures.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13014 
650 2 4 |a Electronics and Microelectronics, Instrumentation.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T24027 
700 1 |a Sklavos, Nicolas.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Chaves, Ricardo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Di Natale, Giorgio.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Regazzoni, Francesco.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319443164 
776 0 8 |i Printed edition:  |z 9783319443171 
776 0 8 |i Printed edition:  |z 9783319830377 
856 4 0 |u https://doi.org/10.1007/978-3-319-44318-8 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)