Introduction to Hardware Security and Trust
Editat de Mohammad Tehranipoor, Cliff Wangen Limba Engleză Paperback – 20 oct 2014
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 733.33 lei 43-57 zile | |
Springer – 20 oct 2014 | 733.33 lei 43-57 zile | |
Hardback (1) | 1011.77 lei 43-57 zile | |
Springer – 21 sep 2011 | 1011.77 lei 43-57 zile |
Preț: 733.33 lei
Preț vechi: 894.31 lei
-18% Nou
Puncte Express: 1100
Preț estimativ în valută:
140.34€ • 145.63$ • 117.30£
140.34€ • 145.63$ • 117.30£
Carte tipărită la comandă
Livrare economică 17-31 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781489990365
ISBN-10: 1489990364
Pagini: 436
Ilustrații: VIII, 427 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.61 kg
Ediția:2012
Editura: Springer
Colecția Springer
Locul publicării:New York, NY, United States
ISBN-10: 1489990364
Pagini: 436
Ilustrații: VIII, 427 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.61 kg
Ediția:2012
Editura: Springer
Colecția Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. Background on VLSI Testing.- 2. Hardware Implementation of Hash Functions.- 3. RSA: Implementation and Security.- 4. Security based on Physical Unclonability and Disorder.- 5. Hardware Metering: A Survey.- 6. Secure Hardware IPs by Digital Watermark.- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures.- 9. Trusted Design in FPGAs.- 10. Security in Embedded Systems.- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers.- 12. Security for RFID Tags.- 13. Memory Integrity Protection.- 14. Trojan Taxonomy.- 15. Hardware Trojan Detection.-16. Design for Hardware Trust.- 17. Security and Testing.- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.
Recenzii
From the reviews:
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)
Textul de pe ultima copertă
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.
- Provides a comprehensive introduction to hardware security and trust;
- Includes coverage at the circuit and systems levels, with applications to design and implementation;
- Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.
Caracteristici
Provides a comprehensive introduction to hardware security and trust Includes coverage at the circuit and systems levels, with applications to design and implementation Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attach and countermeasures for smart cards. Includes supplementary material: sn.pub/extras