Hardware IP Security and Trust
Herausgegeben:Mishra, Prabhat; Bhunia, Swarup; Tehranipoor, Mark
Hardware IP Security and Trust
Herausgegeben:Mishra, Prabhat; Bhunia, Swarup; Tehranipoor, Mark
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques.…mehr
Andere Kunden interessierten sich auch für
- Hardware Protection through Obfuscation81,99 €
- The Hardware Trojan War74,99 €
- Mohammad TehranipoorIntegrated Circuit Authentication88,99 €
- Hardware Security and Trust66,99 €
- Ranga VemuriSplit Manufacturing of Integrated Circuits for Hardware Security and Trust63,99 €
- Ranga VemuriSplit Manufacturing of Integrated Circuits for Hardware Security and Trust63,99 €
- Security, Privacy and Trust in Cloud Systems83,99 €
-
-
-
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
Produktdetails
- Produktdetails
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-84070-3
- Softcover reprint of the original 1st ed. 2017
- Seitenzahl: 368
- Erscheinungstermin: 7. Juli 2018
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 563g
- ISBN-13: 9783319840703
- ISBN-10: 3319840703
- Artikelnr.: 53573572
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-84070-3
- Softcover reprint of the original 1st ed. 2017
- Seitenzahl: 368
- Erscheinungstermin: 7. Juli 2018
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 563g
- ISBN-13: 9783319840703
- ISBN-10: 3319840703
- Artikelnr.: 53573572
Prabhat Mishra is an Associate Professor in the Department of Computer and Information Science and Engineering (CISE) at the University of Florida (UF) where he leads the CISE Embedded Systems Lab. His research interests include design automation of embedded systems, energy-aware computing, reconfigurable architectures, hardware security and trust, system validation and verification, and post-silicon debug. He received his B.E. from Jadavpur University, Kolkata in 1994, M.Tech. from the Indian Institute of Technology, Kharagpur in 1996, and Ph.D. from the University of California, Irvine in 2004 -- all in Computer Science and Engineering. Prior to joining University of Florida, he spent several years in various companies including Intel, Motorola, Synopsys and Texas Instruments. He has published four books and more than 100 research articles in premier international journals and conferences. His research has been recognized by several awards including the NSF CAREER Award from the National Science Foundation, IBM Faculty Award, two best paper awards (VLSI Design 2011 and CODES+ISSS 2003), five best paper nominations (including DAC'09 and DATE'12), and 2004 EDAA Outstanding Dissertation Award from the European Design Automation Association. He has also received the 2007 International Educator of the Year Award from the UF College of Engineering for his international research and teaching contributions. Swarup Bhunia received his B.E. (Hons.) from Jadavpur University, Kolkata, India, and the M.Tech. degree from the Indian Institute of Technology (IIT), Kharagpur. He received his Ph.D. from Purdue University, IN, USA, in 2005. Currently, Dr. Bhunia is a professor in the department of Electrical and Computer Engineering at University of Florida, Gainesville, FL, USA. Earlier, Dr. Bhunia has served as the T. and A. Schroeder associate professor of Electrical Engineering and Computer Science at Case Western Reserve University, Cleveland, OH, USA. He has over ten years of research and development experience with over 200 publications in peer-reviewed journals and premier conferences and four books (three edited) in the area of VLSI design, CAD and test techniques. His research interests include low power and robust design, hardware security and trust, adaptive nanocomputing and novel test methodologies. He has worked in the semiconductor industry on RTL synthesis, verification, and low power design for about three years. Dr. Bhunia received IBM Faculty Award (2013), National Science Foundation (NSF) career development award (2011), Semiconductor Research Corporation (SRC) technical excellence award (2005), best paper award in International Conference on VLSI Design (VLSI Design 2012), best paper award in International Conference on Computer Design (ICCD 2004), best paper award in Latin American Test Workshop (LATW 2003), and best paper nomination in Asia and South Pacific Design Automation Conference (ASP-DAC 2006) and in Hardware Oriented Test and Security (HOST 2010), nomination for John S. Diekhoff Award, Case Western Reserve University (2010) and SRC Inventor Recognition Award (2009). Mark M. Tehranipoor is currently the Intel Charles E. Young Professor in Cybersecurity at the Department of Electrical and Computer Engineering, the University of Florida. His current research projects include: hardware security and trust, electronics supply chain security, counterfeit IC detection and prevention, and reliable and testable VLSI design. Prof. Tehranipoor has published over 250 journal articles and refereed conference papers and has given more than 150 invited talks and keynote addresses since 2006. In addition, he has published six books and ten book chapters. His projects are sponsored by both the industry (Semiconductor Research Corporation (SRC), Texas Instruments, Freescale, Comcast, Honeywell, LSI, Mentor Graphics, Juniper, R3Logic, Cisco, Qualcomm, MediaTeck, etc.) and theGovernment (NSF, ARO, MDA, DOD, AFOSR, DOE, etc.). Prior to joining University of Florida, Dr. Tehranipoor served as the founding director of the Center for Hardware Assurance, Security, and Engineering (CHASE) and the Comcast Center of Excellence in Security Innovation (CSI) at the University of Connecticut. Prof. Tehranipoor is a Senior Member of the IEEE, Golden Core Member of IEEE Computer Society, and Member of ACM and ACM SIGDA. He is also a member of Connecticut Academy of Science and Engineering (CASE).
Part I. Introduction.- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs.- PArt II.Trust Analysis.- Chapter 2.Security Rule Check.- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans.- Chapter 4.Code Coverage Analysis for IP Trust Verification.- Chapter 5.Analyzing Circuit Layout to Probing Attack.- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations.- Part III.- Effective Countermeasures.- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation.- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks.- Part IV.- Chapter 9.Validation of IP Security and Trust.- Chapter 10.IP Trust Validation using Proof-carrying Hardware.- Chapter 11. Hardware Trust Verification.- Chapter 12.Verification of Unspecified IP Functionality.- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions.- Chapter 14.Test Generation for Detection of Malicious Parametric Variations.- Part V. Conclusions.- Chapter 15.The Future of Trustworthy SoC Design.
Part I. Introduction.- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs.- PArt II.Trust Analysis.- Chapter 2.Security Rule Check.- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans.- Chapter 4.Code Coverage Analysis for IP Trust Verification.- Chapter 5.Analyzing Circuit Layout to Probing Attack.- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations.- Part III.- Effective Countermeasures.- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation.- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks.- Part IV.- Chapter 9.Validation of IP Security and Trust.- Chapter 10.IP Trust Validation using Proof-carrying Hardware.- Chapter 11. Hardware Trust Verification.- Chapter 12.Verification of Unspecified IP Functionality.- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions.- Chapter 14.Test Generation for Detection of Malicious Parametric Variations.- Part V. Conclusions.- Chapter 15.The Future of Trustworthy SoC Design.