000 | 03905nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-319-68511-3 | ||
003 | DE-He213 | ||
005 | 20220801220347.0 | ||
007 | cr nn 008mamaa | ||
008 | 171129s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319685113 _9978-3-319-68511-3 |
||
024 | 7 |
_a10.1007/978-3-319-68511-3 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
245 | 1 | 4 |
_aThe Hardware Trojan War _h[electronic resource] : _bAttacks, Myths, and Defenses / _cedited by Swarup Bhunia, Mark M. Tehranipoor. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aVIII, 389 p. 189 illus., 154 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart I. Hardware Trojan Preliminaries -- Chapter 1.Introduction -- Chapter 2.Introduction to Hardware Trojans -- Part II. Hardware Trojan attacks: Threat Analysis -- Chapter 3.Hardware Trojan Attacks in SoC and NoC -- Chapter 4. Hardware IP Trust -- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs -- Chapter 6. Hardware Trojans and Piracy of PCBs -- Part III. Detection-Logic Testing -- Chapter 7. Logic Testing for Hardware Trojan Detection -- Chapter 8. Formal Approaches to Hardware Trust Verification -- Chapter 9. Golden-free Trojan Detection -- Part IV-Detection-Side Channel analysis -- Chapter 10. Detecting Hardware Trojans using Delay Analysis -- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection -- Part VI. Emerging Trent, Inductrial Practices, New Attacks -- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges -- Chapter 16.Conclusion and Future Work. | |
520 | _aThis book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronics. _93425 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _949874 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aElectronics and Microelectronics, Instrumentation. _932249 |
650 | 2 | 4 |
_aHardware Performance and Reliability. _932357 |
700 | 1 |
_aBhunia, Swarup. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949875 |
|
700 | 1 |
_aTehranipoor, Mark M. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949876 |
|
710 | 2 |
_aSpringerLink (Online service) _949877 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319685106 |
776 | 0 | 8 |
_iPrinted edition: _z9783319685120 |
776 | 0 | 8 |
_iPrinted edition: _z9783319886145 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-68511-3 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78485 _d78485 |