The Hardware Trojan War Attacks, Myths, and Defenses /

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myth...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Bhunia, Swarup (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Tehranipoor, Mark M. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Part I. Hardware Trojan Preliminaries
  • Chapter 1.Introduction
  • Chapter 2.Introduction to Hardware Trojans
  • Part II. Hardware Trojan attacks: Threat Analysis
  • Chapter 3.Hardware Trojan Attacks in SoC and NoC
  • Chapter 4. Hardware IP Trust
  • Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs
  • Chapter 6. Hardware Trojans and Piracy of PCBs
  • Part III. Detection-Logic Testing
  • Chapter 7. Logic Testing for Hardware Trojan Detection
  • Chapter 8. Formal Approaches to Hardware Trust Verification
  • Chapter 9. Golden-free Trojan Detection
  • Part IV-Detection-Side Channel analysis
  • Chapter 10. Detecting Hardware Trojans using Delay Analysis
  • Chapter 11. Reverse-Engineering Based Hardware Trojan Detection
  • Part VI. Emerging Trent, Inductrial Practices, New Attacks
  • Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges
  • Chapter 16.Conclusion and Future Work.