2012

Introduction to Hardware Security and Trust

Editors:

ISBN: 978-1-4419-8079-3 (Print) 978-1-4419-8080-9 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages i-viii

  2. No Access

    Book Chapter

    Pages 1-25

    Background on VLSI Testing

  3. No Access

    Book Chapter

    Pages 27-50

    Hardware Implementation of Hash Functions

  4. No Access

    Book Chapter

    Pages 51-64

    RSA: Implementation and Security

  5. No Access

    Book Chapter

    Pages 65-102

    Security Based on Physical Unclonability and Disorder

  6. No Access

    Book Chapter

    Pages 103-122

    Hardware Metering: A Survey

  7. No Access

    Book Chapter

    Pages 123-141

    Secure Hardware IPs by Digital Watermark

  8. No Access

    Book Chapter

    Pages 143-173

    Physical Attacks and Tamper Resistance

  9. No Access

    Book Chapter

    Pages 175-194

    Side Channel Attacks and Countermeasures

  10. No Access

    Book Chapter

    Pages 195-229

    Trusted Design in FPGAs

  11. No Access

    Book Chapter

    Pages 231-261

    Security in Embedded Systems

  12. No Access

    Book Chapter

    Pages 263-282

    Side-Channel Attacks and Countermeasures for Embedded Microcontrollers

  13. No Access

    Book Chapter

    Pages 283-303

    Security for RFID Tags

  14. No Access

    Book Chapter

    Pages 305-324

    Memory Integrity Protection

  15. No Access

    Book Chapter

    Pages 325-338

    Trojan Taxonomy

  16. No Access

    Book Chapter

    Pages 339-364

    Hardware Trojan Detection

  17. No Access

    Book Chapter

    Pages 365-384

    Design for Hardware Trust

  18. No Access

    Book Chapter

    Pages 385-409

    Security and Testing

  19. No Access

    Book Chapter

    Pages 411-427

    Protecting IPs Against Scan-Based Side-Channel Attacks