Hardware IP Security and Trust

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the sec...

Full description

Bibliographic Details
Other Authors: Mishra, Prabhat (Editor), Bhunia, Swarup (Editor), Tehranipoor, Mark (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2017, 2017
Edition:1st ed. 2017
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03298nmm a2200409 u 4500
001 EB001345596
003 EBX01000000000000000899786
005 00000000000000.0
007 cr|||||||||||||||||||||
008 170203 ||| eng
020 |a 9783319490250 
100 1 |a Mishra, Prabhat  |e [editor] 
245 0 0 |a Hardware IP Security and Trust  |h Elektronische Ressource  |c edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor 
250 |a 1st ed. 2017 
260 |a Cham  |b Springer International Publishing  |c 2017, 2017 
300 |a XII, 353 p. 131 illus., 78 illus. in color  |b online resource 
505 0 |a Part I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. Hardware Trust Verification -- Chapter 12.Verification of Unspecified IP Functionality -- Chapter 13.Verifying Security Properties in Modern SoCs using Instruction-level Abstractions -- Chapter 14. Test Generation for Detection of Malicious Parametric Variations -- Part V. Conclusions -- Chapter 15.The Future of Trustworthy SoC Design 
653 |a Electronics and Microelectronics, Instrumentation 
653 |a Cryptography 
653 |a Electronic circuits 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Processor Architectures 
653 |a Cryptology 
653 |a Microprocessors 
653 |a Electronics 
653 |a Electronic Circuits and Systems 
653 |a Data and Information Security 
653 |a Computer architecture 
700 1 |a Bhunia, Swarup  |e [editor] 
700 1 |a Tehranipoor, Mark  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-3-319-49025-0 
856 4 0 |u https://doi.org/10.1007/978-3-319-49025-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.3815 
520 |a This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs