Integrated Circuit Authentication, Softcover reprint of the original 1st ed. 2014 Hardware Trojans and Counterfeit Detection
Auteurs : Tehranipoor Mohammad, Salmani Hassan, Zhang Xuehui
Introduction.- Hardware Trojan Detection: Untrusted Third-party IP Cores.- Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits.- Design for Hardware Trust: Dummy Scan Flip-flop Insertion.- Design for Hardware Trust: Layout-aware Scan Cell Reordering.- Design for Hardware Trust: Ring Oscillator Network.- Design Vulnerability Analysis.- Trojan Prevention: Built-In Self-Authentication.- Counterfeit Ics: Taxonomies, Assessment, and Challenges.- Counterfeit Ics: Detection and Prevention of Recycled Ics Using On-chip Sensors.- Counterfeit Ics: Pathy-Delay Fingerprinting.
Date de parution : 08-2016
Ouvrage de 222 p.
15.5x23.5 cm
Date de parution : 10-2013
Ouvrage de 222 p.
15.5x23.5 cm