Secure Integrated Circuits and Systems
Title | Secure Integrated Circuits and Systems PDF eBook |
Author | Ingrid M.R. Verbauwhede |
Publisher | Springer Science & Business Media |
Pages | 250 |
Release | 2010-04-05 |
Genre | Computers |
ISBN | 038771829X |
On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.
Hardware Security and Trust
Title | Hardware Security and Trust PDF eBook |
Author | Nicolas Sklavos |
Publisher | Springer |
Pages | 254 |
Release | 2017-01-11 |
Genre | Technology & Engineering |
ISBN | 3319443186 |
This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.
Split Manufacturing of Integrated Circuits for Hardware Security and Trust
Title | Split Manufacturing of Integrated Circuits for Hardware Security and Trust PDF eBook |
Author | Ranga Vemuri |
Publisher | Springer Nature |
Pages | 193 |
Release | 2021-05-25 |
Genre | Technology & Engineering |
ISBN | 3030734455 |
Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade. This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.
Enabling the Internet of Things
Title | Enabling the Internet of Things PDF eBook |
Author | Massimo Alioto |
Publisher | Springer |
Pages | 527 |
Release | 2017-01-23 |
Genre | Technology & Engineering |
ISBN | 3319514822 |
This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).
On-Chip Current Sensors for Reliable, Secure, and Low-Power Integrated Circuits
Title | On-Chip Current Sensors for Reliable, Secure, and Low-Power Integrated Circuits PDF eBook |
Author | Rodrigo Possamai Bastos |
Publisher | Springer Nature |
Pages | 187 |
Release | 2019-09-30 |
Genre | Technology & Engineering |
ISBN | 303029353X |
This book provides readers with insight into an alternative approach for enhancing the reliability, security, and low power features of integrated circuit designs, related to transient faults, hardware Trojans, and power consumption. The authors explain how the addition of integrated sensors enables the detection of ionizing particles and how this information can be processed at a high layer. The discussion also includes a variety of applications, such as the detection of hardware Trojans and fault attacks, and how sensors can operate to provide different body bias levels and reduce power costs. Readers can benefit from these sensors-based approaches through designs with fast response time, non-intrusive integration on gate-level and reasonable design costs.
Introduction to Hardware Security and Trust
Title | Introduction to Hardware Security and Trust PDF eBook |
Author | Mohammad Tehranipoor |
Publisher | Springer Science & Business Media |
Pages | 429 |
Release | 2011-09-22 |
Genre | Technology & Engineering |
ISBN | 1441980806 |
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
Behavioral Synthesis for Hardware Security
Title | Behavioral Synthesis for Hardware Security PDF eBook |
Author | Srinivas Katkoori |
Publisher | Springer Nature |
Pages | 397 |
Release | 2022-02-08 |
Genre | Technology & Engineering |
ISBN | 3030788415 |
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.