Hardware Protection through Obfuscation

Hardware Protection through Obfuscation

Forte, Domenic; Tehranipoor, Mark M.; Bhunia, Swarup

Springer International Publishing AG

07/2018

349

Mole

Inglês

9783319840680

15 a 20 dias

557

Descrição não disponível.
Part 1: Hardware Obfuscation Preliminaries.- Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation.- VLSI Test and Hardware Security Background for Hardware Obfuscation.- Part 2: Logic-based Hardware Obfuscation.- Logic Encryption.- Gate Camouflaging-based Obfuscation.- Permutation-Based Obfuscation.- Protection of Assets from Scan Chain Vulnerabilities through Obfuscation.- Part 3: Finite State Machine (FSM) Based Hardware Obfuscation.- Active Hardware Metering by Finite State Machine Obfuscation.- State Space Obfuscation and its Application in Hardware Intellectual Property Protection.- Structural Transformation-based Obfuscation.- Part 4: Hardware Obfuscation Based on Emerging Integration Approaches.- Part IV Hardware Obfuscation Based on Emerging Integration Approaches.- Split Manufacturing.- Obfuscated Built-in Self Authentication.- 3D/2.5D IC based Obfuscation.- Part 5: Other Hardware Obfuscation Building Blocks.- Obfuscation and Encryption for Securing Semiconductor Supply Chain.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Counterfeit electronics;Integrated circuit authentication;Counterfeit integrated circuit;Hardware obfuscation;Hardware security and trust