Dekorationsartikel gehören nicht zum Leistungsumfang.
Integrated Circuit Authentication
Hardware Trojans and Counterfeit Detection
Buch von Mohammad Tehranipoor (u. a.)
Sprache: Englisch

99,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-3 Wochen

Kategorien:
Beschreibung
This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.
This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.
Zusammenfassung

Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits

Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits

Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip's conformance with the original functional and performance specifications

Includes supplementary material: [...]

Inhaltsverzeichnis

Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.

Details
Erscheinungsjahr: 2013
Fachbereich: Nachrichtentechnik
Genre: Technik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Seiten: 240
Inhalt: xvi
222 S.
55 s/w Illustr.
65 farbige Illustr.
222 p. 120 illus.
65 illus. in color.
ISBN-13: 9783319008158
ISBN-10: 3319008153
Sprache: Englisch
Herstellernummer: 86232292
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Tehranipoor, Mohammad
Zhang, Xuehui
Salmani, Hassan
Auflage: 2014
Hersteller: Springer International Publishing
Maße: 241 x 160 x 18 mm
Von/Mit: Mohammad Tehranipoor (u. a.)
Erscheinungsdatum: 16.10.2013
Gewicht: 0,53 kg
preigu-id: 105701402
Zusammenfassung

Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits

Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits

Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip's conformance with the original functional and performance specifications

Includes supplementary material: [...]

Inhaltsverzeichnis

Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.

Details
Erscheinungsjahr: 2013
Fachbereich: Nachrichtentechnik
Genre: Technik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Seiten: 240
Inhalt: xvi
222 S.
55 s/w Illustr.
65 farbige Illustr.
222 p. 120 illus.
65 illus. in color.
ISBN-13: 9783319008158
ISBN-10: 3319008153
Sprache: Englisch
Herstellernummer: 86232292
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Tehranipoor, Mohammad
Zhang, Xuehui
Salmani, Hassan
Auflage: 2014
Hersteller: Springer International Publishing
Maße: 241 x 160 x 18 mm
Von/Mit: Mohammad Tehranipoor (u. a.)
Erscheinungsdatum: 16.10.2013
Gewicht: 0,53 kg
preigu-id: 105701402
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte