000 04293nam a22005655i 4500
001 978-3-319-44318-8
003 DE-He213
005 20220801222631.0
007 cr nn 008mamaa
008 170113s2017 sz | s |||| 0|eng d
020 _a9783319443188
_9978-3-319-44318-8
024 7 _a10.1007/978-3-319-44318-8
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aHardware Security and Trust
_h[electronic resource] :
_bDesign and Deployment of Integrated Circuits in a Threatened Environment /
_cedited by Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aX, 254 p. 99 illus., 47 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aAES Datapaths on FPGAs: a State of the Art Analysis -- Fault Attacks, Injection Techniques and Tools for Simulation -- Recent developments in side-channel analysis on Elliptic Curve Cryptography implementations -- Practical Session: Differential Power Analysis for Beginners -- Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems -- Scan Design: Basics, Advancements and Vulnerabilities -- Manufacturing Testing & Security Countermeasures -- Malware Threats and Solutions for Trustworthy Mobile Systems Design -- Ring Oscillators and Hardware Trojan Detection -- Notions on Silicon Physically Unclonable Functions -- Implementation of delay-based PUFs on Altera FPGAs -- Implementation and Analysis of Ring Oscillator Circuits on Xilinx FPGAs.-.
520 _aThis book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable of detecting faults and resisting fault attacks; Establishes a design and synthesis flow to transform a given circuit into a secure design, incorporating counter-measures against fault attacks.
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_962507
650 0 _aComputer architecture.
_93513
650 0 _aElectronics.
_93425
650 1 4 _aElectronic Circuits and Systems.
_962508
650 2 4 _aProcessor Architectures.
_962509
650 2 4 _aElectronics and Microelectronics, Instrumentation.
_932249
700 1 _aSklavos, Nicolas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_962510
700 1 _aChaves, Ricardo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_962511
700 1 _aDi Natale, Giorgio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_962512
700 1 _aRegazzoni, Francesco.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_962513
710 2 _aSpringerLink (Online service)
_962514
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319443164
776 0 8 _iPrinted edition:
_z9783319443171
776 0 8 _iPrinted edition:
_z9783319830377
856 4 0 _uhttps://doi.org/10.1007/978-3-319-44318-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80989
_d80989