The Hardware Trojan War Attacks, Myths, and Defenses

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myth...

Full description

Bibliographic Details
Other Authors: Bhunia, Swarup (Editor), Tehranipoor, Mark M. (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2018, 2018
Edition:1st ed. 2018
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Description
Summary:This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways
Physical Description:VIII, 389 p. 189 illus., 154 illus. in color online resource
ISBN:9783319685113