Foundations of Hardware IP Protection
Editat de Lilian Bossuet, Lionel Torresen Limba Engleză Hardback – 17 ian 2017
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 569.90 lei 6-8 săpt. | |
Springer International Publishing – 13 iul 2018 | 569.90 lei 6-8 săpt. | |
Hardback (1) | 769.04 lei 6-8 săpt. | |
Springer International Publishing – 17 ian 2017 | 769.04 lei 6-8 săpt. |
Preț: 769.04 lei
Preț vechi: 937.85 lei
-18% Nou
Puncte Express: 1154
Preț estimativ în valută:
147.16€ • 154.82$ • 121.84£
147.16€ • 154.82$ • 121.84£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319503783
ISBN-10: 3319503782
Pagini: 240
Ilustrații: VII, 240 p. 125 illus., 48 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.53 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319503782
Pagini: 240
Ilustrații: VII, 240 p. 125 illus., 48 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.53 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Digital Right Management for IP Protection.- Turning Electronic Circuits Features into On-Chip Locks.- Logic Modification-Based IP Protection Methods: An Overview and a Proposal.- IP FSM Watermarking.- Side Channel Analysis, an Efficient Ally for IP Protection.- Hardware Obfuscation.- An application of Partial Hardware Reverse Engineering for the Detection of Hardware Trojan.- Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach.- Ultra-Lightweight Implementation in Area of Block Ciphers.- Enhancing Secure Elements – Technology and Architecture.
Notă biografică
Lilian Bossuet is an Associate Professor at University of Saint-Etienne, head of the Embedded System Security group and head of the Computer Science departement of the Laboratoire Hubert Curien. His research is in the general area of embedded systems design, including hardware security of embedded systems (data, intellectual property and system security) and reconfigurable hardware design. His active research topics focus on Hardware security, war against illegal IC copy and counterfeiting, IP protection, PUF design and characterization, side channel attacks and countermeasures, TRNG attack, MCryptoPSoC architecture and design, crypto-processor architecture and design, embedded system security, and FPGA security.
Lionel Torres is Professor at the University of Montpellier (Polytech Montpellier engineering school), France. His research activities is part of the microelectronic department of the Laboratory of Informatics, Robotics and Microelectronics of Montpellier (laboratory to the University of Montpellier and the French National Center for Scientic Research (CNRS)). His research interests concern system level architecture, with a specific focus in the security and cryptographic applications and Non-Volatile Computing based on MRAM. He has a PhD from the University of Montpellier in microelectronic design and was at the head of the microelectronic department of LIRMM and he is now deputy head of Polyptych Montpellier and at the Head of the Labex (Laboratory of Excellence) of Digital and Hardware Solutions, Environmental and Organic Life Modeling. He is also co-founder of the Algodone company, company proposing a Digital Right Management solution for silicon IP.
Lionel Torres is Professor at the University of Montpellier (Polytech Montpellier engineering school), France. His research activities is part of the microelectronic department of the Laboratory of Informatics, Robotics and Microelectronics of Montpellier (laboratory to the University of Montpellier and the French National Center for Scientic Research (CNRS)). His research interests concern system level architecture, with a specific focus in the security and cryptographic applications and Non-Volatile Computing based on MRAM. He has a PhD from the University of Montpellier in microelectronic design and was at the head of the microelectronic department of LIRMM and he is now deputy head of Polyptych Montpellier and at the Head of the Labex (Laboratory of Excellence) of Digital and Hardware Solutions, Environmental and Organic Life Modeling. He is also co-founder of the Algodone company, company proposing a Digital Right Management solution for silicon IP.
Textul de pe ultima copertă
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.
· Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP;
· Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security;
· Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems.
· Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP;
· Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security;
· Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems.
Caracteristici
Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems Includes supplementary material: sn.pub/extras