Hardware IP security and trust

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the sec...

Full description

Saved in:
Bibliographic Details
Other Authors: Bhunia, Swarup., Tehranipoor, Mohammad H., 1974-, Mishra, Prabhat, 1973-
Format: eBook
Language: English
Published: Cham, Switzerland : Springer, 2017.
Subjects:
ISBN: 9783319490250
9783319490243
Physical Description: 1 online resource

Cover

Table of contents

LEADER 06064cam a2200493Mi 4500
001 99697
003 CZ-ZlUTB
005 20240914112136.0
006 m o d
007 cr |n|||||||||
008 170106s2017 sz ob 001 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d N$T  |d IDEBK  |d EBLCP  |d GW5XE  |d N$T  |d OCLCF  |d OCLCQ  |d CNCGM  |d OCLCO  |d NJR  |d UPM  |d VT2  |d UWO  |d JBG  |d IAD  |d ICW  |d ICN  |d OCLCQ  |d UAB  |d IOG  |d U3W  |d CAUOI  |d OCLCQ  |d KSU  |d AU@  |d OCLCQ  |d ESU  |d WYU  |d IAD  |d LVT  |d MERER  |d OCLCQ  |d ERF  |d ADU  |d UKBTH  |d LEATE  |d UKAHL  |d OCLCQ 
020 |a 9783319490250  |q (electronic bk.) 
020 |z 9783319490243 
024 7 |a 10.1007/978-3-319-49025-0  |2 doi 
035 |a (OCoLC)967765463  |z (OCoLC)967656009  |z (OCoLC)968184936  |z (OCoLC)972955566  |z (OCoLC)973057907  |z (OCoLC)974651577  |z (OCoLC)981090968  |z (OCoLC)981821388  |z (OCoLC)988827162  |z (OCoLC)1005756548  |z (OCoLC)1012073974  |z (OCoLC)1048183079  |z (OCoLC)1058387056  |z (OCoLC)1066614988  |z (OCoLC)1086421533  |z (OCoLC)1112594237  |z (OCoLC)1113421387  |z (OCoLC)1113494490  |z (OCoLC)1117170044  |z (OCoLC)1122810968 
245 0 0 |a Hardware IP security and trust /  |c Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, editors. 
260 |a Cham, Switzerland :  |b Springer,  |c 2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
505 0 |a Acknowledgements; Contents; Abbreviations (Acronyms); Part I Introduction; 1 Security and Trust Vulnerabilities in Third-Party IPs; 1.1 Introduction; 1.2 Design and Validation of SoCs; 1.3 Security and Trust Vulnerabilities in Third-Party IPs; 1.4 Trustworthy SoC Design Using Untrusted IPs; 1.5 Book Organization; References; Part II Trust Analysis; 2 Security Rule Check; 2.1 Introduction; 2.2 Security Assets and Attack Models; 2.2.1 Asset; 2.2.2 Potential Access to Assets; 2.2.3 Potential Adversary for Intentional Attacks; 2.3 DSeRC: Design Security Rule Check; 2.3.1 Vulnerabilities. 
505 8 |a 2.3.1.1 Sources of Vulnerabilities2.3.1.2 Vulnerabilities at Different Abstraction Levels; 2.3.2 Metrics and Rules; 2.3.3 Workflow of DSeRC Framework; 2.4 Development of DSeRC Framework; 2.4.1 Vulnerabilities, Metrics, and Rules; 2.4.2 Tool Development; 2.4.3 Development of Design Guidelines for Security; 2.4.4 Development of Countermeasure Techniques; 2.5 Conclusion; References; 3 Digital Circuit Vulnerabilities to Hardware Trojans; 3.1 Introduction; 3.2 The Gate-Level Design Vulnerability Analysis Flow; 3.3 The Layout-Level Design Vulnerability Analysis Flow; 3.3.1 Cell and Routing Analyses. 
505 8 |a 3.3.2 Net Analysis3.4 Trojan Analyses; 3.5 Conclusions; References; 4 Code Coverage Analysis for IP Trust Verification; 4.1 Introduction; 4.2 SoC Design Flow; 4.3 Hardware Trojan Structure; 4.4 Related Work; 4.5 A Case Study for IP Trust Verification; 4.5.1 Formal Verification and Coverage Analysis; 4.5.2 Techniques for Suspicious Signals Reduction; 4.5.2.1 Phase 1: Test Bench Generation and Suspicious Signal Identification; 4.5.2.2 Phase 2: Suspicious Signals Analysis; 4.6 Simulation Results; 4.6.1 Benchmark Setup; 4.6.2 Impact of Test Bench on Coverage Analysis. 
505 8 |a 4.6.3 Reducing the Suspicious Signals4.6.4 Trojan Coverage Analysis; 4.7 Conclusion; References; 5 Analyzing Circuit Layout to Probing Attack; 5.1 Introduction; 5.2 Microprobing Attack Techniques; 5.2.1 Essential Steps in a Probing Attack; 5.2.2 Microprobing Through Milling; 5.2.3 Back-Side Techniques; 5.2.4 Other Related Techniques; 5.3 Protection Against Probing Attacks; 5.3.1 Active Shields; 5.3.2 Techniques to Attack and Secure Active Shields; 5.3.2.1 Routing Overhead; 5.3.2.2 Stuck on Top Metal Layer; 5.3.3 Other Antiprobing Designs; 5.3.4 Summary on Antiprobing Protections. 
505 8 |a 5.4 Layout-Based Evaluation Framework5.4.1 Motivation; 5.4.2 Assessment Rules; 5.4.3 State-of-the-Art Active Shield Model; 5.4.4 Impact of Milling Angle upon Effect of Bypass Attack; 5.4.5 Algorithm to Find Exposed Area; 5.4.6 Discussions on Applications of Exposed Area Algorithm; 5.5 Conclusion; References; 6 Testing of Side-Channel Leakage of Cryptographic Intellectual Properties: Metrics and Evaluations; 6.1 Introduction; 6.2 Preliminaries on Statistical Testing and Testing of Hypothesis; 6.2.1 Sampling and Estimation; 6.2.2 Some Statistical Distributions. 
500 |a Includes index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs. 
504 |a Includes bibliographical references at the end of each chapters and index. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet Protocol multimedia subsystem. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Bhunia, Swarup. 
700 1 |a Tehranipoor, Mohammad H.,  |d 1974- 
700 1 |a Mishra, Prabhat,  |d 1973- 
776 0 8 |i Print version:  |t Hardware IP security and trust.  |d Cham, Switzerland : Springer, 2017  |z 3319490249  |z 9783319490243  |w (OCoLC)959950567 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-49025-0  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99697  |d 99697 
993 |x NEPOSILAT  |y EIZ