Cargando…

Introduction to Hardware Security and Trust

The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad ran...

Descripción completa

Detalles Bibliográficos
Autores principales: Tehranipoor, Mohammad, Wang, Cliff
Lenguaje:eng
Publicado: Springer 2012
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-1-4419-8080-9
http://cds.cern.ch/record/1503618
_version_ 1780927142070059008
author Tehranipoor, Mohammad
Wang, Cliff
author_facet Tehranipoor, Mohammad
Wang, Cliff
author_sort Tehranipoor, Mohammad
collection CERN
description The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures. Provides a comprehensive introduction to hardware security and trust; Includes coverage at the circuit and systems levels, with applications to design and implementation; Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.
id cern-1503618
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2012
publisher Springer
record_format invenio
spelling cern-15036182021-04-21T23:54:46Zdoi:10.1007/978-1-4419-8080-9http://cds.cern.ch/record/1503618engTehranipoor, MohammadWang, CliffIntroduction to Hardware Security and TrustEngineeringThe emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures. Provides a comprehensive introduction to hardware security and trust; Includes coverage at the circuit and systems levels, with applications to design and implementation; Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.Springeroai:cds.cern.ch:15036182012
spellingShingle Engineering
Tehranipoor, Mohammad
Wang, Cliff
Introduction to Hardware Security and Trust
title Introduction to Hardware Security and Trust
title_full Introduction to Hardware Security and Trust
title_fullStr Introduction to Hardware Security and Trust
title_full_unstemmed Introduction to Hardware Security and Trust
title_short Introduction to Hardware Security and Trust
title_sort introduction to hardware security and trust
topic Engineering
url https://dx.doi.org/10.1007/978-1-4419-8080-9
http://cds.cern.ch/record/1503618
work_keys_str_mv AT tehranipoormohammad introductiontohardwaresecurityandtrust
AT wangcliff introductiontohardwaresecurityandtrust