Cantitate/Preț
Produs

Foundations of Hardware IP Protection

Editat de Lilian Bossuet, Lionel Torres
en Limba Engleză Hardback – 17 ian 2017
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 56990 lei  6-8 săpt.
  Springer International Publishing – 13 iul 2018 56990 lei  6-8 săpt.
Hardback (1) 76904 lei  6-8 săpt.
  Springer International Publishing – 17 ian 2017 76904 lei  6-8 săpt.

Preț: 76904 lei

Preț vechi: 93785 lei
-18% Nou

Puncte Express: 1154

Preț estimativ în valută:
14716 15482$ 12184£

Carte tipărită la comandă

Livrare economică 15-29 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319503783
ISBN-10: 3319503782
Pagini: 240
Ilustrații: VII, 240 p. 125 illus., 48 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.53 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland

Cuprins

Digital Right Management for IP Protection.- Turning Electronic Circuits Features into On-Chip Locks.- Logic Modification-Based IP Protection Methods: An Overview and a Proposal.- IP FSM Watermarking.- Side Channel Analysis, an Efficient Ally for IP Protection.- Hardware Obfuscation.- An application of Partial Hardware Reverse Engineering for the Detection of Hardware Trojan.- Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach.- Ultra-Lightweight Implementation in Area of Block Ciphers.- Enhancing Secure Elements – Technology and Architecture.


Notă biografică

Lilian Bossuet is an Associate Professor at University of Saint-Etienne, head of the Embedded System Security group and head of the Computer Science departement of the Laboratoire Hubert Curien.  His research is in the general area of embedded systems design, including hardware security of embedded systems (data, intellectual property and system security) and reconfigurable hardware design.  His active research topics focus on Hardware security, war against illegal IC copy and counterfeiting, IP protection, PUF design and characterization, side channel attacks and countermeasures, TRNG attack, MCryptoPSoC architecture and design, crypto-processor architecture and design, embedded system security, and FPGA security.

Lionel Torres is Professor at the University of Montpellier (Polytech Montpellier engineering school), France. His research activities is part of the microelectronic department of the Laboratory of Informatics, Robotics and Microelectronics of Montpellier (laboratory to the University of Montpellier and the French National Center for Scientic Research (CNRS)). His research interests concern system level architecture, with a specific focus in the security and cryptographic applications and Non-Volatile Computing based on MRAM. He has a PhD from the University of Montpellier in microelectronic design and was at the head of the microelectronic department of LIRMM and he is now deputy head of Polyptych Montpellier and at the Head of the Labex (Laboratory of Excellence) of Digital and Hardware Solutions, Environmental and Organic Life Modeling. He is also co-founder of the Algodone company, company proposing a Digital Right Management solution for silicon IP.


Textul de pe ultima copertă

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.
·         Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP;
·         Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security;
·         Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems.

Caracteristici

Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems Includes supplementary material: sn.pub/extras