Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection /
This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current,...
| Main Authors: | Tehranipoor, Mohammad (Author), Salmani, Hassan (Author), Zhang, Xuehui (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Counterfeit Integrated Circuits Detection and Avoidance /
by: Tehranipoor, Mark (Mohammad), et al.
Published: (2015) -
More-than-Moore 2.5D and 3D SiP Integration
by: Radojcic, Riko
Published: (2017) -
Functional Verification of Dynamically Reconfigurable FPGA-based Systems
by: Gong, Lingkan, et al.
Published: (2015) -
SVA: The Power of Assertions in SystemVerilog
by: Cerny, Eduard, et al.
Published: (2015) -
Out-of-order Parallel Discrete Event Simulation for Electronic System-level Design
by: Chen, Weiwei
Published: (2015)