Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
2014
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext |
Beschreibung: | This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products. · Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; · Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; · Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; · Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion |
Beschreibung: | 1 Online-Ressource (XVI, 222 p.) 120 illus., 65 illus. in color |
ISBN: | 9783319008165 |
DOI: | 10.1007/978-3-319-00816-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041470921 | ||
003 | DE-604 | ||
005 | 20231110 | ||
007 | cr|uuu---uuuuu | ||
008 | 131210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319008165 |9 978-3-319-00816-5 | ||
024 | 7 | |a 10.1007/978-3-319-00816-5 |2 doi | |
035 | |a (OCoLC)865039172 | ||
035 | |a (DE-599)BVBBV041470921 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-92 |a DE-634 |a DE-859 |a DE-898 |a DE-573 |a DE-861 |a DE-706 |a DE-863 |a DE-862 | ||
082 | 0 | |a 621.3815 |2 23 | |
100 | 1 | |a Tehranipoor, Mohammad |d 1974- |e Verfasser |0 (DE-588)1072377934 |4 aut | |
245 | 1 | 0 | |a Integrated Circuit Authentication |b Hardware Trojans and Counterfeit Detection |c by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang |
264 | 1 | |c 2014 | |
300 | |a 1 Online-Ressource (XVI, 222 p.) |b 120 illus., 65 illus. in color | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products. · Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; · Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; · Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; · Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion | ||
505 | 0 | |a Introduction -- Hardware Trojan Detection: Untrusted Third-party IP Cores -- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits -- Design for Hardware Trust: Dummy Scan Flip-flop Insertion -- Design for Hardware Trust: Layout-aware Scan Cell Reordering -- Design for Hardware Trust: Ring Oscillator Network -- Design Vulnerability Analysis -- Trojan Prevention: Built-In Self-Authentication -- Counterfeit Ics: Taxonomies, Assessment, and Challenges -- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors -- Counterfeit Ics: Pathy-Delay Fingerprinting | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer science | |
650 | 4 | |a Systems engineering | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Processor Architectures | |
650 | 4 | |a Electronic Circuits and Devices | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Integrierte Schaltung |0 (DE-588)4027242-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Integrierte Schaltung |0 (DE-588)4027242-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Salmani, Hassan |e Sonstige |4 oth | |
700 | 1 | |a Zhang, Xuehui |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-00816-5 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026917064 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-00816-5 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1015710 |
---|---|
_version_ | 1806174832660840448 |
any_adam_object | |
author | Tehranipoor, Mohammad 1974- |
author_GND | (DE-588)1072377934 |
author_facet | Tehranipoor, Mohammad 1974- |
author_role | aut |
author_sort | Tehranipoor, Mohammad 1974- |
author_variant | m t mt |
building | Verbundindex |
bvnumber | BV041470921 |
collection | ZDB-2-ENG |
contents | Introduction -- Hardware Trojan Detection: Untrusted Third-party IP Cores -- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits -- Design for Hardware Trust: Dummy Scan Flip-flop Insertion -- Design for Hardware Trust: Layout-aware Scan Cell Reordering -- Design for Hardware Trust: Ring Oscillator Network -- Design Vulnerability Analysis -- Trojan Prevention: Built-In Self-Authentication -- Counterfeit Ics: Taxonomies, Assessment, and Challenges -- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors -- Counterfeit Ics: Pathy-Delay Fingerprinting |
ctrlnum | (OCoLC)865039172 (DE-599)BVBBV041470921 |
dewey-full | 621.3815 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3815 |
dewey-search | 621.3815 |
dewey-sort | 3621.3815 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-00816-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04394nmm a2200637zc 4500</leader><controlfield tag="001">BV041470921</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231110 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319008165</subfield><subfield code="9">978-3-319-00816-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-00816-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)865039172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041470921</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3815</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tehranipoor, Mohammad</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1072377934</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrated Circuit Authentication</subfield><subfield code="b">Hardware Trojans and Counterfeit Detection</subfield><subfield code="c">by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 222 p.)</subfield><subfield code="b">120 illus., 65 illus. in color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products. · Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; · Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; · Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; · Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Hardware Trojan Detection: Untrusted Third-party IP Cores -- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits -- Design for Hardware Trust: Dummy Scan Flip-flop Insertion -- Design for Hardware Trust: Layout-aware Scan Cell Reordering -- Design for Hardware Trust: Ring Oscillator Network -- Design Vulnerability Analysis -- Trojan Prevention: Built-In Self-Authentication -- Counterfeit Ics: Taxonomies, Assessment, and Challenges -- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors -- Counterfeit Ics: Pathy-Delay Fingerprinting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Processor Architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic Circuits and Devices</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Integrierte Schaltung</subfield><subfield code="0">(DE-588)4027242-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Integrierte Schaltung</subfield><subfield code="0">(DE-588)4027242-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Salmani, Hassan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Xuehui</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026917064</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-00816-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041470921 |
illustrated | Illustrated |
indexdate | 2024-08-01T10:55:48Z |
institution | BVB |
isbn | 9783319008165 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026917064 |
oclc_num | 865039172 |
open_access_boolean | |
owner | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XVI, 222 p.) 120 illus., 65 illus. in color |
psigel | ZDB-2-ENG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
record_format | marc |
spellingShingle | Tehranipoor, Mohammad 1974- Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection Introduction -- Hardware Trojan Detection: Untrusted Third-party IP Cores -- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits -- Design for Hardware Trust: Dummy Scan Flip-flop Insertion -- Design for Hardware Trust: Layout-aware Scan Cell Reordering -- Design for Hardware Trust: Ring Oscillator Network -- Design Vulnerability Analysis -- Trojan Prevention: Built-In Self-Authentication -- Counterfeit Ics: Taxonomies, Assessment, and Challenges -- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors -- Counterfeit Ics: Pathy-Delay Fingerprinting Engineering Computer science Systems engineering Circuits and Systems Processor Architectures Electronic Circuits and Devices Informatik Ingenieurwissenschaften Computersicherheit (DE-588)4274324-2 gnd Integrierte Schaltung (DE-588)4027242-4 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4027242-4 |
title | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection |
title_auth | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection |
title_exact_search | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection |
title_full | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang |
title_fullStr | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang |
title_full_unstemmed | Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection by Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang |
title_short | Integrated Circuit Authentication |
title_sort | integrated circuit authentication hardware trojans and counterfeit detection |
title_sub | Hardware Trojans and Counterfeit Detection |
topic | Engineering Computer science Systems engineering Circuits and Systems Processor Architectures Electronic Circuits and Devices Informatik Ingenieurwissenschaften Computersicherheit (DE-588)4274324-2 gnd Integrierte Schaltung (DE-588)4027242-4 gnd |
topic_facet | Engineering Computer science Systems engineering Circuits and Systems Processor Architectures Electronic Circuits and Devices Informatik Ingenieurwissenschaften Computersicherheit Integrierte Schaltung |
url | https://doi.org/10.1007/978-3-319-00816-5 |
work_keys_str_mv | AT tehranipoormohammad integratedcircuitauthenticationhardwaretrojansandcounterfeitdetection AT salmanihassan integratedcircuitauthenticationhardwaretrojansandcounterfeitdetection AT zhangxuehui integratedcircuitauthenticationhardwaretrojansandcounterfeitdetection |