Hardware IP security and trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the sec...
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
2017.
|
Subjects: | |
ISBN: | 9783319490250 9783319490243 |
Physical Description: | 1 online resource |
LEADER | 06064cam a2200493Mi 4500 | ||
---|---|---|---|
001 | 99697 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112136.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 170106s2017 sz ob 001 0 eng d | ||
040 | |a YDX |b eng |e pn |c YDX |d N$T |d IDEBK |d EBLCP |d GW5XE |d N$T |d OCLCF |d OCLCQ |d CNCGM |d OCLCO |d NJR |d UPM |d VT2 |d UWO |d JBG |d IAD |d ICW |d ICN |d OCLCQ |d UAB |d IOG |d U3W |d CAUOI |d OCLCQ |d KSU |d AU@ |d OCLCQ |d ESU |d WYU |d IAD |d LVT |d MERER |d OCLCQ |d ERF |d ADU |d UKBTH |d LEATE |d UKAHL |d OCLCQ | ||
020 | |a 9783319490250 |q (electronic bk.) | ||
020 | |z 9783319490243 | ||
024 | 7 | |a 10.1007/978-3-319-49025-0 |2 doi | |
035 | |a (OCoLC)967765463 |z (OCoLC)967656009 |z (OCoLC)968184936 |z (OCoLC)972955566 |z (OCoLC)973057907 |z (OCoLC)974651577 |z (OCoLC)981090968 |z (OCoLC)981821388 |z (OCoLC)988827162 |z (OCoLC)1005756548 |z (OCoLC)1012073974 |z (OCoLC)1048183079 |z (OCoLC)1058387056 |z (OCoLC)1066614988 |z (OCoLC)1086421533 |z (OCoLC)1112594237 |z (OCoLC)1113421387 |z (OCoLC)1113494490 |z (OCoLC)1117170044 |z (OCoLC)1122810968 | ||
245 | 0 | 0 | |a Hardware IP security and trust / |c Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, editors. |
260 | |a Cham, Switzerland : |b Springer, |c 2017. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
505 | 0 | |a Acknowledgements; Contents; Abbreviations (Acronyms); Part I Introduction; 1 Security and Trust Vulnerabilities in Third-Party IPs; 1.1 Introduction; 1.2 Design and Validation of SoCs; 1.3 Security and Trust Vulnerabilities in Third-Party IPs; 1.4 Trustworthy SoC Design Using Untrusted IPs; 1.5 Book Organization; References; Part II Trust Analysis; 2 Security Rule Check; 2.1 Introduction; 2.2 Security Assets and Attack Models; 2.2.1 Asset; 2.2.2 Potential Access to Assets; 2.2.3 Potential Adversary for Intentional Attacks; 2.3 DSeRC: Design Security Rule Check; 2.3.1 Vulnerabilities. | |
505 | 8 | |a 2.3.1.1 Sources of Vulnerabilities2.3.1.2 Vulnerabilities at Different Abstraction Levels; 2.3.2 Metrics and Rules; 2.3.3 Workflow of DSeRC Framework; 2.4 Development of DSeRC Framework; 2.4.1 Vulnerabilities, Metrics, and Rules; 2.4.2 Tool Development; 2.4.3 Development of Design Guidelines for Security; 2.4.4 Development of Countermeasure Techniques; 2.5 Conclusion; References; 3 Digital Circuit Vulnerabilities to Hardware Trojans; 3.1 Introduction; 3.2 The Gate-Level Design Vulnerability Analysis Flow; 3.3 The Layout-Level Design Vulnerability Analysis Flow; 3.3.1 Cell and Routing Analyses. | |
505 | 8 | |a 3.3.2 Net Analysis3.4 Trojan Analyses; 3.5 Conclusions; References; 4 Code Coverage Analysis for IP Trust Verification; 4.1 Introduction; 4.2 SoC Design Flow; 4.3 Hardware Trojan Structure; 4.4 Related Work; 4.5 A Case Study for IP Trust Verification; 4.5.1 Formal Verification and Coverage Analysis; 4.5.2 Techniques for Suspicious Signals Reduction; 4.5.2.1 Phase 1: Test Bench Generation and Suspicious Signal Identification; 4.5.2.2 Phase 2: Suspicious Signals Analysis; 4.6 Simulation Results; 4.6.1 Benchmark Setup; 4.6.2 Impact of Test Bench on Coverage Analysis. | |
505 | 8 | |a 4.6.3 Reducing the Suspicious Signals4.6.4 Trojan Coverage Analysis; 4.7 Conclusion; References; 5 Analyzing Circuit Layout to Probing Attack; 5.1 Introduction; 5.2 Microprobing Attack Techniques; 5.2.1 Essential Steps in a Probing Attack; 5.2.2 Microprobing Through Milling; 5.2.3 Back-Side Techniques; 5.2.4 Other Related Techniques; 5.3 Protection Against Probing Attacks; 5.3.1 Active Shields; 5.3.2 Techniques to Attack and Secure Active Shields; 5.3.2.1 Routing Overhead; 5.3.2.2 Stuck on Top Metal Layer; 5.3.3 Other Antiprobing Designs; 5.3.4 Summary on Antiprobing Protections. | |
505 | 8 | |a 5.4 Layout-Based Evaluation Framework5.4.1 Motivation; 5.4.2 Assessment Rules; 5.4.3 State-of-the-Art Active Shield Model; 5.4.4 Impact of Milling Angle upon Effect of Bypass Attack; 5.4.5 Algorithm to Find Exposed Area; 5.4.6 Discussions on Applications of Exposed Area Algorithm; 5.5 Conclusion; References; 6 Testing of Side-Channel Leakage of Cryptographic Intellectual Properties: Metrics and Evaluations; 6.1 Introduction; 6.2 Preliminaries on Statistical Testing and Testing of Hypothesis; 6.2.1 Sampling and Estimation; 6.2.2 Some Statistical Distributions. | |
500 | |a Includes index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs. | ||
504 | |a Includes bibliographical references at the end of each chapters and index. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Internet Protocol multimedia subsystem. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Bhunia, Swarup. | |
700 | 1 | |a Tehranipoor, Mohammad H., |d 1974- | |
700 | 1 | |a Mishra, Prabhat, |d 1973- | |
776 | 0 | 8 | |i Print version: |t Hardware IP security and trust. |d Cham, Switzerland : Springer, 2017 |z 3319490249 |z 9783319490243 |w (OCoLC)959950567 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-49025-0 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99697 |d 99697 | ||
993 | |x NEPOSILAT |y EIZ |