Foundations of hardware IP protection
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional...
Saved in:
| Other Authors | , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Cham, Switzerland :
Springer,
2017.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9783319503806 9783319503783 |
| Physical Description | 1 online resource |
Cover
| Summary: | This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems. |
|---|---|
| Item Description: | Includes index. |
| ISBN: | 9783319503806 9783319503783 |
| Access: | Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty |
| Physical Description: | 1 online resource |