Mohammad Tehranipoor & Hassan Salmani 
Integrated Circuit Authentication [PDF ebook] 
Hardware Trojans and Counterfeit Detection

支持

This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.

€106.99
支付方式

表中的内容

Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.

购买此电子书可免费获赠一本!
语言 英语 ● 格式 PDF ● 网页 222 ● ISBN 9783319008165 ● 文件大小 9.9 MB ● 出版者 Springer International Publishing ● 市 Cham ● 国家 CH ● 发布时间 2013 ● 下载 24 个月 ● 货币 EUR ● ID 2835927 ● 复制保护 社会DRM

来自同一作者的更多电子书 / 编辑

18,901 此类电子书