Trusted Digital Circuits

Hardware Trojan Vulnerabilities, Prevention and Detection

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Advanced Computing, Engineering, Computer Architecture
Cover of the book Trusted Digital Circuits by Hassan Salmani, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Hassan Salmani ISBN: 9783319790817
Publisher: Springer International Publishing Publication: April 19, 2018
Imprint: Springer Language: English
Author: Hassan Salmani
ISBN: 9783319790817
Publisher: Springer International Publishing
Publication: April 19, 2018
Imprint: Springer
Language: English

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

More books from Springer International Publishing

Cover of the book Corruption and Anti-Corruption in Policing—Philosophical and Ethical Issues by Hassan Salmani
Cover of the book The Urban Political by Hassan Salmani
Cover of the book Opening Markets for Foreign Skills: How Can the WTO Help? by Hassan Salmani
Cover of the book Demography, Politics, and Partisan Polarization in the United States, 1828–2016 by Hassan Salmani
Cover of the book Antibacterials by Hassan Salmani
Cover of the book Macroergonomics for Manufacturing Systems by Hassan Salmani
Cover of the book Philosophies and Sociologies of Bioethics by Hassan Salmani
Cover of the book Learning How to Teach Mathematical Modeling in School and Teacher Education by Hassan Salmani
Cover of the book Clinical Management of Pregnancies following ART by Hassan Salmani
Cover of the book Contemporary Bohemia: A Case Study of an Artistic Community in Philadelphia by Hassan Salmani
Cover of the book Corporal Punishment in U.S. Public Schools by Hassan Salmani
Cover of the book African Traditional Medicine: Autonomy and Informed Consent by Hassan Salmani
Cover of the book Emerging Trends and Advanced Technologies for Computational Intelligence by Hassan Salmani
Cover of the book Distal Radius Fractures by Hassan Salmani
Cover of the book Biotechnologies and Biomimetics for Civil Engineering by Hassan Salmani
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy