106,95 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits
Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits
Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip's conformance with the original functional and performance specifications
Includes supplementary material: [...]
Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Nachrichtentechnik |
Genre: | Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: |
xvi
222 S. 55 s/w Illustr. 65 farbige Illustr. 222 p. 120 illus. 65 illus. in color. |
ISBN-13: | 9783319008158 |
ISBN-10: | 3319008153 |
Sprache: | Englisch |
Herstellernummer: | 86232292 |
Ausstattung / Beilage: | HC runder Rücken kaschiert |
Einband: | Gebunden |
Autor: |
Tehranipoor, Mohammad
Zhang, Xuehui Salmani, Hassan |
Hersteller: |
Springer Nature Switzerland
Springer International Publishing Springer International Publishing AG |
Verantwortliche Person für die EU: | Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com |
Maße: | 241 x 160 x 18 mm |
Von/Mit: | Mohammad Tehranipoor (u. a.) |
Erscheinungsdatum: | 16.10.2013 |
Gewicht: | 0,53 kg |
Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits
Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits
Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip's conformance with the original functional and performance specifications
Includes supplementary material: [...]
Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Nachrichtentechnik |
Genre: | Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: |
xvi
222 S. 55 s/w Illustr. 65 farbige Illustr. 222 p. 120 illus. 65 illus. in color. |
ISBN-13: | 9783319008158 |
ISBN-10: | 3319008153 |
Sprache: | Englisch |
Herstellernummer: | 86232292 |
Ausstattung / Beilage: | HC runder Rücken kaschiert |
Einband: | Gebunden |
Autor: |
Tehranipoor, Mohammad
Zhang, Xuehui Salmani, Hassan |
Hersteller: |
Springer Nature Switzerland
Springer International Publishing Springer International Publishing AG |
Verantwortliche Person für die EU: | Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com |
Maße: | 241 x 160 x 18 mm |
Von/Mit: | Mohammad Tehranipoor (u. a.) |
Erscheinungsdatum: | 16.10.2013 |
Gewicht: | 0,53 kg |