Freshly Printed - allow 10 days lead
Hardware Security
A Hands-on Learning Approach
Thorough training guide on hardware security issues and solutions relating to all forms of electronic hardware, including chips, PCBs and systems
Swarup Bhunia (Author), Mark Tehranipoor (Author)
9780128124772, Elsevier Science
Paperback, published 2 November 2018
526 pages
23.4 x 19 x 3.3 cm, 1.07 kg
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
1. Introduction to Hardware Security Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training
Subject Areas: Computer architecture & logic design [UYF]