000 03905nam a22005895i 4500
001 978-3-319-68511-3
003 DE-He213
005 20220801220347.0
007 cr nn 008mamaa
008 171129s2018 sz | s |||| 0|eng d
020 _a9783319685113
_9978-3-319-68511-3
024 7 _a10.1007/978-3-319-68511-3
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 4 _aThe Hardware Trojan War
_h[electronic resource] :
_bAttacks, Myths, and Defenses /
_cedited by Swarup Bhunia, Mark M. Tehranipoor.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aVIII, 389 p. 189 illus., 154 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPart I. Hardware Trojan Preliminaries -- Chapter 1.Introduction -- Chapter 2.Introduction to Hardware Trojans -- Part II. Hardware Trojan attacks: Threat Analysis -- Chapter 3.Hardware Trojan Attacks in SoC and NoC -- Chapter 4. Hardware IP Trust -- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs -- Chapter 6. Hardware Trojans and Piracy of PCBs -- Part III. Detection-Logic Testing -- Chapter 7. Logic Testing for Hardware Trojan Detection -- Chapter 8. Formal Approaches to Hardware Trust Verification -- Chapter 9. Golden-free Trojan Detection -- Part IV-Detection-Side Channel analysis -- Chapter 10. Detecting Hardware Trojans using Delay Analysis -- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection -- Part VI. Emerging Trent, Inductrial Practices, New Attacks -- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges -- Chapter 16.Conclusion and Future Work.
520 _aThis book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.
650 0 _aElectronic circuits.
_919581
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aElectronics.
_93425
650 0 _aComputers.
_98172
650 1 4 _aElectronic Circuits and Systems.
_949874
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aElectronics and Microelectronics, Instrumentation.
_932249
650 2 4 _aHardware Performance and Reliability.
_932357
700 1 _aBhunia, Swarup.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949875
700 1 _aTehranipoor, Mark M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949876
710 2 _aSpringerLink (Online service)
_949877
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319685106
776 0 8 _iPrinted edition:
_z9783319685120
776 0 8 _iPrinted edition:
_z9783319886145
856 4 0 _uhttps://doi.org/10.1007/978-3-319-68511-3
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78485
_d78485