Normal view MARC view ISBD view

Trustworthy Hardware Design: Combinational Logic Locking Techniques [electronic resource] / by Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu.

By: Yasin, Muhammad [author.].
Contributor(s): Rajendran, Jeyavijayan (JV) [author.] | Sinanoglu, Ozgur [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Analog Circuits and Signal Processing: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020.Description: XXI, 142 p. 65 illus., 58 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030153342.Subject(s): Electronic circuits | Logic design | Computer arithmetic and logic units | Electronic Circuits and Systems | Logic Design | Arithmetic and Logic StructuresAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 621.3815 Online resources: Click here to access online
Contents:
The Need for Logic Locking -- A Brief History of Logic Locking -- Pre-SAT Logic Locking -- The SAT Attack -- Post-SAT 1: Point function-based Logic Locking -- Approximate Attacks -- Structural Attacks -- Post-SAT 2: Insertion of SAT-unresolvable Structures -- Post-SAT 3: Stripped-Functionality Logic Locking.
In: Springer Nature eBookSummary: With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
    average rating: 0.0 (0 votes)
No physical items for this record

The Need for Logic Locking -- A Brief History of Logic Locking -- Pre-SAT Logic Locking -- The SAT Attack -- Post-SAT 1: Point function-based Logic Locking -- Approximate Attacks -- Structural Attacks -- Post-SAT 2: Insertion of SAT-unresolvable Structures -- Post-SAT 3: Stripped-Functionality Logic Locking.

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.

There are no comments for this item.

Log in to your account to post a comment.