Hardware Protection through Obfuscation

Hardware Protection through Obfuscation
Author: Domenic Forte
Publisher: Springer
Total Pages: 352
Release: 2017-01-02
Genre: Technology & Engineering
ISBN: 3319490192


Download Hardware Protection through Obfuscation Book in PDF, Epub and Kindle

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.


Hardware Protection through Obfuscation
Language: en
Pages: 352
Authors: Domenic Forte
Categories: Technology & Engineering
Type: BOOK - Published: 2017-01-02 - Publisher: Springer

GET EBOOK

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key
Advanced VLSI Design and Testability Issues
Language: en
Pages: 379
Authors: Suman Lata Tripathi
Categories: Technology & Engineering
Type: BOOK - Published: 2020-08-18 - Publisher: CRC Press

GET EBOOK

This book facilitates the VLSI-interested individuals with not only in-depth knowledge, but also the broad aspects of it by explaining its applications in diffe
Surreptitious Software
Language: en
Pages: 939
Authors: Jasvir Nagra
Categories: Computers
Type: BOOK - Published: 2009-07-24 - Publisher: Pearson Education

GET EBOOK

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, an
Behavioral Synthesis for Hardware Security
Language: en
Pages: 397
Authors: Srinivas Katkoori
Categories: Technology & Engineering
Type: BOOK - Published: 2022-02-08 - Publisher: Springer Nature

GET EBOOK

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-se
Hardware IP Security and Trust
Language: en
Pages: 351
Authors: Prabhat Mishra
Categories: Technology & Engineering
Type: BOOK - Published: 2017-01-02 - Publisher: Springer

GET EBOOK

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be comp