Advertisement

Hardware IP Security and Trust

  • Prabhat Mishra
  • Swarup Bhunia
  • Mark Tehranipoor

Table of contents

  1. Front Matter
    Pages i-xii
  2. Introduction

    1. Front Matter
      Pages 1-1
    2. Prabhat Mishra, Mark Tehranipoor, Swarup Bhunia
      Pages 3-14
  3. Trust Analysis

    1. Front Matter
      Pages 15-15
    2. Adib Nahiyan, Kan Xiao, Domenic Forte, Mark Tehranipoor
      Pages 17-36
    3. Hassan Salmani, Mark Tehranipoor
      Pages 37-51
    4. Adib Nahiyan, Mark Tehranipoor
      Pages 53-72
    5. Qihang Shi, Domenic Forte, Mark M. Tehranipoor
      Pages 73-98
    6. Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay
      Pages 99-131
  4. Effective Countermeasures

    1. Front Matter
      Pages 133-133
    2. Qiaoyan Yu, Jaya Dofe, Yuejun Zhang, Jonathan Frey
      Pages 135-163
  5. Security and Trust Validation

    1. Front Matter
      Pages 185-185
    2. Farimah Farahmandi, Prabhat Mishra
      Pages 187-205
    3. Xiaolong Guo, Raj Gautam Dutta, Yier Jin
      Pages 207-225
    4. Qiang Xu, Lingxiao Wei
      Pages 227-253
    5. Nicole Fern, Kwang-Ting (Tim) Cheng
      Pages 255-285
    6. Yuanwen Huang, Prabhat Mishra
      Pages 325-340
  6. Conclusion

    1. Front Matter
      Pages 341-341
    2. Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
      Pages 343-349
  7. Back Matter
    Pages 351-353

About this book

Introduction

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Keywords

Counterfeit electronics Integrated circuit authentication Counterfeit integrated circuit IC security vulnerabilities IC design for security Hardware security and trust

Editors and affiliations

  • Prabhat Mishra
    • 1
  • Swarup Bhunia
    • 2
  • Mark Tehranipoor
    • 3
  1. 1.Department of Computer and Information Science and EngineeringUniversity of Florida GainesvilleUSA
  2. 2.Department of Electrical and Computer EngineeringUniversity of Florida GainesvilleUSA
  3. 3.Department of Electrical and Computer EngineeringUniversity of Florida GainesvilleUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-49025-0
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-49024-3
  • Online ISBN 978-3-319-49025-0
  • Buy this book on publisher's site