Introduction to Hardware Security and Trust

  • Mohammad Tehranipoor
  • Cliff Wang

Table of contents

  1. Front Matter
    Pages i-viii
  2. Junxia Ma, Mohammad Tehranipoor
    Pages 1-25
  3. Zhijie Shi, Chujiao Ma, Jordan Cote, Bing Wang
    Pages 27-50
  4. Nicholas Tuzzio, Mohammad Tehranipoor
    Pages 51-64
  5. Ulrich Rührmair, Srinivas Devadas, Farinaz Koushanfar
    Pages 65-102
  6. Farinaz Koushanfar
    Pages 103-122
  7. Gang Qu, Lin Yuan
    Pages 123-141
  8. Sergei Skorobogatov
    Pages 143-173
  9. Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potkonjak
    Pages 195-229
  10. Yunsi Fei, Juan Carlos Martinez Santos
    Pages 231-261
  11. Patrick Schaumont, Zhimin Chen
    Pages 263-282
  12. Jia Di, Dale R. Thompson
    Pages 283-303
  13. Yin Hu, Berk Sunar
    Pages 305-324
  14. Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld
    Pages 325-338
  15. Seetharam Narasimhan, Swarup Bhunia
    Pages 339-364
  16. Yier Jin, Eric Love, Yiorgos Makris
    Pages 365-384
  17. Kurt Rosenfeld, Ramesh Karri
    Pages 385-409
  18. Mohammad Tehranipoor, Jeremy Lee
    Pages 411-427

About this book


The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.

  • Provides a comprehensive introduction to hardware security and trust;
  • Includes coverage at the circuit and systems levels, with applications to design and implementation;
  • Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.


Embedded Systems Embedded Systems Hardware security and trust Hardware security and trust Integrated Circuit Design Integrated Circuit Design Secure Embedded Systems Secure Embedded Systems Secure Integrated Circuits Secure Integrated Circuits

Editors and affiliations

  • Mohammad Tehranipoor
    • 1
  • Cliff Wang
    • 2
  1. 1., ECE Dept.University of ConnecticutStorrsUSA
  2. 2.Computing and Information Science Div.Engineering Sciences DirectorateTriangle ParkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer Science+Business Media, LLC 2012
  • Publisher Name Springer, New York, NY
  • eBook Packages Engineering
  • Print ISBN 978-1-4419-8079-3
  • Online ISBN 978-1-4419-8080-9
  • Buy this book on publisher's site