Introduction to Hardware Security and Trust
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad ran...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
New York, NY :
Springer New York,
2012.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- 1. Background on VLSI Testing
- 2. Hardware Implementation of Hash Functions
- 3. RSA: Implementation and Security
- 4. Security based on Physical Unclonability and Disorder
- 5. Hardware Metering: A Survey
- 6. Secure Hardware IPs by Digital Watermark
- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures
- 9. Trusted Design in FPGAs
- 10. Security in Embedded Systems
- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers
- 12. Security for RFID Tags
- 13. Memory Integrity Protection
- 14. Trojan Taxonomy
- 15. Hardware Trojan Detection.-16. Design for Hardware Trust
- 17. Security and Testing
- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.