Mohammad Tehranipoor, Cliff Wang

#Hardware
#Security
#COTS
#FPGAs
#Microprocessors
#DSPs
#VLSI
#RFID
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
Table of Contents
Chapter 1 Background on VLSI Testing
Chapter 2 Hardware Implementation of Hash Functions
Chapter 3 RSA: Implementation and Security
Chapter 4 Security Based on Physical Unclonability and Disorder
Chapter 5 Hardware Metering: A Survey
Chapter 6 Secure Hardware IPs by Digital Watermark
Chapter 7 Physical Attacks and Tamper Resistance
Chapter 8 Side Channel Attacks and Countermeasures
Chapter 9 Trusted Design in FPGAs
Chapter 10 Security in Embedded Systems
Chapter 11 Side-Channel Attacks and Countermeasures for Embedded Microcontrollers
Chapter 12 Security for RFID Tags
Chapter 13 Memory Integrity Protection
Chapter 14 Trojan Taxonomy
Chapter 15 Hardware Trojan Detection
Chapter 16 Design for Hardware Trust
Chapter 17 Security and Testing
Chapter 18 Protecting IPs Against Scan-Based Side-Channel Attacks
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)









