Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection /
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack
- Circuit Vulnerabilities to Hardware Trojans at the Register Transfer Level
- Design Techniques for Hardware Trojans Prevention and Detection at the Register Transfer Level
- Circuit Vulnerabilities to Hardware Trojans at the Gate Level
- Design Techniques for Hardware Trojans Prevention and Detection at the Gate Level
- Circuit Vulnerabilities to Hardware Trojan at the Layout Level
- Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level
- Trusted Testing Techniques for Hardware Trojan Detection
- Hardware Trojans in Analog and Mixed-Signal Integrated Circuits.