000 03335nam a22004815i 4500
001 978-3-319-00816-5
003 DE-He213
005 20200420220218.0
007 cr nn 008mamaa
008 131004s2014 gw | s |||| 0|eng d
020 _a9783319008165
_9978-3-319-00816-5
024 7 _a10.1007/978-3-319-00816-5
_2doi
050 4 _aTK7888.4
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
082 0 4 _a621.3815
_223
100 1 _aTehranipoor, Mohammad.
_eauthor.
245 1 0 _aIntegrated Circuit Authentication
_h[electronic resource] :
_bHardware Trojans and Counterfeit Detection /
_cby Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXVI, 222 p. 120 illus., 65 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Hardware Trojan Detection: Untrusted Third-party IP Cores -- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits -- Design for Hardware Trust: Dummy Scan Flip-flop Insertion -- Design for Hardware Trust: Layout-aware Scan Cell Reordering -- Design for Hardware Trust: Ring Oscillator Network -- Design Vulnerability Analysis -- Trojan Prevention: Built-In Self-Authentication -- Counterfeit Ics: Taxonomies, Assessment, and Challenges -- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors -- Counterfeit Ics: Pathy-Delay Fingerprinting.
520 _aThis book provides readers with a comprehensive introduction to hardware Trojans.  The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products.   �         Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; �         Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; �         Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; �         Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.
650 0 _aEngineering.
650 0 _aMicroprocessors.
650 0 _aElectronic circuits.
650 1 4 _aEngineering.
650 2 4 _aCircuits and Systems.
650 2 4 _aProcessor Architectures.
650 2 4 _aElectronic Circuits and Devices.
700 1 _aSalmani, Hassan.
_eauthor.
700 1 _aZhang, Xuehui.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319008158
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-00816-5
912 _aZDB-2-ENG
942 _cEBK
999 _c51709
_d51709