Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for…mehr
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries.
Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
Swarup Bhunia is a professor in the department of Electrical and Computer Engineering at the University of Florida. He has more than ten years of research and development experience with over 200 publications in peer-reviewed journals and premier conferences. His research interests include hardware security and trust, adaptive nanocomputing and novel test methodologies. Dr. Bhunia received the IBM Faculty Award (2013), National Science Foundation career development award (2011), Semiconductor Research Corporation Inventor Recognition Award (2009), and SRC technical excellence award (2005), and several best paper awards/nominations. He has been serving as an associate editor of IEEE Transactions on CAD, IEEE Transactions on Multi-Scale Computing Systems, ACM Journal of Emerging Technologies, and Journal of Low Power Electronics; served as guest editor of IEEE Design & Test of Computers (2010, 2013) and IEEE Journal on Emerging and Selected Topics in Circuits and Systems (2014). He is a senior member of IEEE.
Inhaltsangabe
1. Introduction to Hardware Security
Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures
Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training
1. Introduction to Hardware Security Part I: Electronic Hardware (ASIC, FPGA, PCBs) 2. Background on Electronic Hardware 3. System on Chip (S0C) Design and Test 4. Printed Circuit Boards (PCBs) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS 5. Hardware Trojan Horse 6. Hardware Supply Chain Issues 7. Hardware IP Piracy and IP Reverse Engineering 8. Side Channel Attacks (SCA) 9. Scan based Attacks, JTAG Hacks and DMA Attacks 10. IC Microprobing Attacks and IC Reverse Engineering 11. Attacks on PCB - Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS 12. Hardware Security Primitives 13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits 14. Hardware Obfuscation 15. PCB Integrity Validation and Authentication Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS 16. Joint Hardware Software Attacks and Countermeasures 17. Summary and Future Directions
Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures
Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training
1. Introduction to Hardware Security Part I: Electronic Hardware (ASIC, FPGA, PCBs) 2. Background on Electronic Hardware 3. System on Chip (S0C) Design and Test 4. Printed Circuit Boards (PCBs) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS 5. Hardware Trojan Horse 6. Hardware Supply Chain Issues 7. Hardware IP Piracy and IP Reverse Engineering 8. Side Channel Attacks (SCA) 9. Scan based Attacks, JTAG Hacks and DMA Attacks 10. IC Microprobing Attacks and IC Reverse Engineering 11. Attacks on PCB - Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS 12. Hardware Security Primitives 13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits 14. Hardware Obfuscation 15. PCB Integrity Validation and Authentication Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS 16. Joint Hardware Software Attacks and Countermeasures 17. Summary and Future Directions
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826